Search Results - (( evolution classification issues algorithm ) OR ( java applications mobile algorithm ))

Refine Results
  1. 1
  2. 2

    Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets by Saeed, Sana

    Published 2019
    “…The proposed algorithm is grounded on the two famous metaheuristic algorithms: cuckoo search (CS) and covariance matrix adaptation evolution strategy (CMA-es). …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Differential evolution for neural networks learning enhancement by Ismail Wdaa, Abdul Sttar

    Published 2008
    “…Evolutionary computation is the name given to a collection of algorithms based on the evolution of a population toward a solution of a certain problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…Besides, mobile phone that able to run J2ME application is being chosen because it was designed specifically for mobile devices which support small memory footprint and low power consumption.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Email spam classification based on deep learning methods: A review by Tusher, Ekramul Haque, Mohd Arfian, Ismail, Anis Farihan, Mat Raffei

    Published 2025
    “…Deep learning has become a potent collection of techniques for addressing intricate issues such as spam classification in recent times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The potential for this project to be propagated on a mobile platform can also be considered due to its Java platform.…”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…Such methodology can be achieved by java programming language for mobile clients J2ME, and by using a second generation mobile phones. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  19. 19

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise