Search Results - (( developing mobile function algorithm ) OR ( java based detection algorithm ))

Refine Results
  1. 1

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…Due to the importance of blood vessel detection in many medical tools and the increasing demand for portable diagnosis equipment, fast blood vessel detection algorithm in a standalone and portable device is very important. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  5. 5

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design. by Khatun, Sabira

    Published 2006
    “…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
    Get full text
    Patent
  7. 7

    Text steganalysis using evolution algorithm approach by Din, Roshidi, Tuan Muda, Tuan Zalizam, Lertkrai, Puriwat, Omar, Mohd Nizam, Amphawan, Angela, Aziz, Fakhrul Anuar

    Published 2012
    “…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Smart and energy aware routing for the internet of mobile things by Beh, Zi Xuan

    Published 2021
    “…This project is to design a smart and energy aware routing algorithm for the Internet of Mobile Things. Reason of doing this project is because the discovery of problem such as high occurrence in routing loop and unsuccessful packet routing under high mobility environment for Internet of Mobile Things. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…There were three iteration in this project to develop and enhance the functionality of the mobile application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Age And Gender Recognition Mobile App by Wee, Quo Lung

    Published 2023
    “…In addition, the User Interface (UI) of the existing mobile app is unappealing. Therefore, this study aimed to develop age and gender recognition mobile application using deep learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Marketplace product recommendation using collaborative filter / Muhammad Alif Fauzan Ismail by Ismail, Muhammad Alif Fauzan

    Published 2021
    “…The algorithm used to develop a product recommendation engine is collaborative filtering algorithm and this algorithm is written in python. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…In the software development testing we examine image based clustering, as we can used clustering by distance base, by pixel (red, green, blue) value etc., The problem is solved by region based method which is based on connect component and background detection techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. …”
    Proceedings Paper
  17. 17

    MOBILE DICTIONARY by Ibrahim, Siti Nabilah

    Published 2005
    “…The objectives of the study is to develop a Mobile Dictionary system, namely MobileDic which able to cater for single and multiword translation in Malay and English language in J2ME-enabled mobile phones. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Trajectory tracking control of two wheels mobile robot by Abd Ghani, N. M., Raja Ismail, R. M.T., Noordin, Nurul Hazlina, Ahmad, Mohd Ashraf

    Published 2011
    “…This project focuses on the development of a line follower control algorithm for a Two Wheels Mobile Robot. …”
    Get full text
    Get full text
    Research Report
  19. 19

    NLP- based for providing mental health support in mobile application / Muhammad Amirul Roslan by Roslan, Muhammad Amirul

    Published 2025
    “…Future enhancements, such as advanced machine learning algorithms and user interface improvements, are proposed to further enhance functionality. …”
    Get full text
    Get full text
    Thesis
  20. 20