Search Results - (( developing mobile web algorithm ) OR ( java implication drops algorithm ))
Search alternatives:
- implication drops »
- java implication »
- web algorithm »
-
1
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
2
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Consequently, The proposed caching scheme, Rough Cultural Algorithm (RCA) is developed to materialise the caching policies.…”
Get full text
Get full text
Article -
3
Route planner mobile web application for UiTM Malaysia / Suzana Ahmad ... [et al.]
Published 2009“…Djikstra’s algorithm together with Google Maps API and Google Earth, which are popular web mapping services providing geospatial data, have been used to develop, a prototype route planner.…”
Get full text
Get full text
Get full text
Article -
4
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…Preliminary results have indicated success in the mobile versions of web applications also. This approach will enable web developers find cross-site scripting vulnerabilities in the mobile versions of their web applications before their release.…”
Get full text
Get full text
Get full text
Article -
5
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Also, as more users are browsing the Internet through their mobile applications, this approach will help in protecting their private data and make browsing safer for them with both Desktop and Mobile web applications.…”
Get full text
Get full text
Get full text
Thesis -
6
-
7
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
8
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024Proceedings Paper -
9
Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.]
Published 2022“…For the initial framework, the tourist mobile application prototype was developed based on Penang tourist areas by using Waterfall Model system development approach. …”
Get full text
Get full text
Get full text
Article -
10
Network routing by mobile agents for image retrieval using fuzzy genetic algorithms
Published 2005“…This research proposes a method to minimize a network routing time taken by the mobile agents using genetic algorithm (GA) to collect query datasets from different hosts from the World Wide Web. …”
Get full text
Get full text
Monograph -
11
-
12
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
Published 2024Proceedings Paper -
13
Integrated Mobile Spain Model Using Artificial Immune System Algorithms
Published 2024Proceedings Paper -
14
A Comparative Study of Text Classifier for Mobile Crowdsensing Applications
Published 2024Proceedings Paper -
15
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…A more sophisticated version of this system can be implemented by developing it on a mobile platform.…”
Get full text
Get full text
Student Project -
16
Target heart rate zone detector during exercise based on real-time facial expression using single shot detection algorithm / Muhammad Azziq Shamsudin, Raihah Aminuddin and Ummu Mar...
Published 2022“…The object detection machine learning model used in this project is Single Shot Detector (SSD) algorithm. The accuracy of the model is above 70% and the web was graded with B in the usability test by the users. …”
Get full text
Get full text
Get full text
Book Section -
17
-
18
-
19
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Moreover, this prototype could be used as the basis for developing more advanced remote monitoring in term of performance to access and interact with mobile cloud, which is the future of mobile technology.…”
Get full text
Get full text
Thesis -
20
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021Get full text
Get full text
Student Project
