Search Results - (( developing mobile case algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- java application »
- during algorithm »
- case algorithm »
- mobile case »
-
1
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Development of mobile robot and localization system
Published 2014“…Thus, the research involves designing an indoor mobile robot and creating algorithm for the mobile robot to localize. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles
Published 2017“…In this project, the same centralized relocating algorithm from the previous research has been used where 15 mobile sensors deployed randomly in a field of 100 meter by 100 meter where these sensors has been deployed one time in a field that obstacles does not exist (case 1) and another time in a field that obstacles existence has been taken into account (case 2), in which these obstacles has been pre-defined positions, where these two cases applied into two different algorithms, which are the original algorithm of a previous research and the modified algorithm of this thesis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Optimization of mobile robot path planning in semi-dynamic environment using genetic algorithm
Published 2023“…Hence, a semi-dynamic obstacle with better optimization solutions is crucial to cope with mobile robots in the industry environment. Thus, this thesis aims to develop a mobile robot for industrial applications by leveraging a genetic algorithm (GA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Design And Development Of Collision Avoidance Strategy For Differential Drive Mobile Robot
Published 2018“…In this project, a collision avoidance strategy is designed and developed for a differential drive mobile robot, which is built using ATmega 328p microcontroller. …”
Get full text
Get full text
Monograph -
7
-
8
Improvement and application of particle swarm optimization algorithm
Published 2025“…When developed for a group of Wheeled Mobile Robots (WMR), a Fault Tolerant Formation Control (FTFC) technique is designed to protect against serious actuator defects. …”
Get full text
Get full text
Article -
9
Extended bat algorithm for PID controller tuning of wheeled mobile robot and swarm robotics target searching strategy
Published 2020“…Hence, EBA which is the proposed method is able to develop target searching algorithm for swarm robotic system and tuning PD controller gains for wheeled mobile robot.…”
Get full text
Get full text
Thesis -
10
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
11
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
12
-
13
A Comparative Study of Text Classifier for Mobile Crowdsensing Applications
Published 2024Proceedings Paper -
14
Effectiveness of mobile agent for query retrieval
Published 2002“…The Mobile Agent Search System (MaSS) has been developed to reduce the time for searching and retrieving information from the Internet. …”
Get full text
Get full text
Get full text
Article -
15
MMS : mobile monitoring system using electrical capacitance tomography (ECT)
Published 2008“…In order to increase the image resolution and result accurately of current tomography research, a study on 16 electrodes sensor ECT system has been developed. The developed system has the mobility to be assembled and moved from a pipeline to another. …”
Get full text
Get full text
Monograph -
16
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis -
17
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
18
Inversion algorithm of fiber bragg grating for nanofluid flooding monitoring
Published 2020“…In the current study, we developed an adaptive algorithm that can predict oil mobilization in a porous medium on the basis of optical data. …”
Get full text
Get full text
Article -
19
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
20
Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.]
Published 2021“…Although more development is still needed for the project, initial testing shows that local council are able to provide a more efficient service to its local neighbourhoods by using the Stray Animal Complaint System mobile application.…”
Get full text
Get full text
Get full text
Book Section
