Search Results - (( developing mobile method algorithm ) OR ( java evaluation using algorithm ))
Search alternatives:
- method algorithm »
- evaluation using »
- java evaluation »
- using algorithm »
- mobile method »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
5
A performance analysis of association rule mining algorithms
Published 2016“…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
Get full text
Get full text
Conference or Workshop Item -
6
Development of mobile robot and localization system
Published 2014“…As such, the purpose of this thesis is to develop the localization of the mobile robot based on Extended Kalman Filter (EKF) method. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Development of behavior-based reactive navigation system for mobile robot
Published 2013“…To solve the problems and achieve the above objective, a new behavior-based reactive navigation system for mobile robots is developed. The motions of Pioneer 3TM mobile robot were simulated to show the developed algorithm performance. …”
Get full text
Get full text
Thesis -
8
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
9
A Mobile Application For Stock Price Prediction
Published 2021“…In conclusion, this project’s objectives were achieved by developing the mobile application for stock price prediction using the best time series algorithm evaluated, which is ARIMA.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
Scan Matching and KNN Classification for Mobile Robot Localisation Algorithm
Published 2017“…The mobile robot and the developed algorithm are tested in static environment. …”
Get full text
Get full text
Conference or Workshop Item -
12
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
13
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
14
Novel algorithm for mobile robot path planning in constrained environment
Published 2021“…In order to verify the performance of the developed method in dealing with constraints, an experimental study was carried out using a Wheeled Mobile Robot (WMR) platform in labs and roads. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Extended bat algorithm for PID controller tuning of wheeled mobile robot and swarm robotics target searching strategy
Published 2020“…Hence, EBA which is the proposed method is able to develop target searching algorithm for swarm robotic system and tuning PD controller gains for wheeled mobile robot.…”
Get full text
Get full text
Thesis -
16
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Optimization of mobile robot path planning in semi-dynamic environment using genetic algorithm
Published 2023“…Hence, a semi-dynamic obstacle with better optimization solutions is crucial to cope with mobile robots in the industry environment. Thus, this thesis aims to develop a mobile robot for industrial applications by leveraging a genetic algorithm (GA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
19
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Recently the importance of mobile security coincides with the development of mobile computing. …”
Get full text
Get full text
Conference or Workshop Item -
20
MAZE ROBOT: APPLYING AUTONOMOUS VEHICLE NAVIGATION ALGORITHM WITH EVENT-DRIVEN PROGRAMMING
Published 2011“…Hardware and software co-design method is used to construct the mobile robot. The basic navigation algorithm was developed using finite state machine (FSM). …”
Get full text
Get full text
Final Year Project
