Search Results - (( developing mobile case algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Development of mobile robot and localization system by Juhari, Khairul Anuar

    Published 2014
    “…Thus, the research involves designing an indoor mobile robot and creating algorithm for the mobile robot to localize. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles by Abdulhasan Al-Jarah, Ali Husam

    Published 2017
    “…In this project, the same centralized relocating algorithm from the previous research has been used where 15 mobile sensors deployed randomly in a field of 100 meter by 100 meter where these sensors has been deployed one time in a field that obstacles does not exist (case 1) and another time in a field that obstacles existence has been taken into account (case 2), in which these obstacles has been pre-defined positions, where these two cases applied into two different algorithms, which are the original algorithm of a previous research and the modified algorithm of this thesis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Optimization of mobile robot path planning in semi-dynamic environment using genetic algorithm by Kasim Hawari, Mohd Zarifitri

    Published 2023
    “…Hence, a semi-dynamic obstacle with better optimization solutions is crucial to cope with mobile robots in the industry environment. Thus, this thesis aims to develop a mobile robot for industrial applications by leveraging a genetic algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Design And Development Of Collision Avoidance Strategy For Differential Drive Mobile Robot by Ng, Sing Yee

    Published 2018
    “…In this project, a collision avoidance strategy is designed and developed for a differential drive mobile robot, which is built using ATmega 328p microcontroller. …”
    Get full text
    Get full text
    Monograph
  7. 7
  8. 8

    Improvement and application of particle swarm optimization algorithm by Deevi, Durga Praveen, Kodadi, Sharadha, Allur, Naga Sushma, Dondapati, Koteswararao, Chetlapalli, Himabindu, Perumal, Thinagaran

    Published 2025
    “…When developed for a group of Wheeled Mobile Robots (WMR), a Fault Tolerant Formation Control (FTFC) technique is designed to protect against serious actuator defects. …”
    Get full text
    Get full text
    Article
  9. 9

    Extended bat algorithm for PID controller tuning of wheeled mobile robot and swarm robotics target searching strategy by Nur Aisyah Syafinaz, Suarin

    Published 2020
    “…Hence, EBA which is the proposed method is able to develop target searching algorithm for swarm robotic system and tuning PD controller gains for wheeled mobile robot.…”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  12. 12
  13. 13
  14. 14

    Effectiveness of mobile agent for query retrieval by Selamat, Ali, Omatu, Sigeru, Yanagimoto, Hidekazu, Fujinaka, Toru, Yoshioka, Michifumi

    Published 2002
    “…The Mobile Agent Search System (MaSS) has been developed to reduce the time for searching and retrieving information from the Internet. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    MMS : mobile monitoring system using electrical capacitance tomography (ECT) by Abdul Rahim, Ruzairi, Chan, Kok Seong

    Published 2008
    “…In order to increase the image resolution and result accurately of current tomography research, a study on 16 electrodes sensor ECT system has been developed. The developed system has the mobility to be assembled and moved from a pipeline to another. …”
    Get full text
    Get full text
    Monograph
  16. 16

    An automated approach to elicit and validate security requirements of mobile application by Yusop, Noorrezam

    Published 2018
    “…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Inversion algorithm of fiber bragg grating for nanofluid flooding monitoring by Yahya, N., Nyuk, C.M., Ismail, A.F., Hussain, N., Rostami, A., Ismail, A., Ganeson, M., Ali, A.M.

    Published 2020
    “…In the current study, we developed an adaptive algorithm that can predict oil mobilization in a porous medium on the basis of optical data. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.] by Kushan, Albin Lemuel, Mahadi, Mohamad Tajuddin, Zulhemay, Mohd Nabil, Sadikan, Siti Fairuz Nurr, Mishan, Mohd Taufik

    Published 2021
    “…Although more development is still needed for the project, initial testing shows that local council are able to provide a more efficient service to its local neighbourhoods by using the Stray Animal Complaint System mobile application.…”
    Get full text
    Get full text
    Get full text
    Book Section