Search Results - (( java application testing algorithm ) OR ( using mobile method algorithm ))

Refine Results
  1. 1

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  2. 2

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…An approach capable of recognizing an audio piece of music with an accuracy equal to 90% was further tested based on this result. In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  4. 4

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Recent industrial solutions to overcome the problem includes using manual registration, using 125kHz proximity card, using mobile application to scan QR code and others. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…A Java-based robot development tool has been set up as alternative programming methods incorporating LeJos and the controller. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  9. 9
  10. 10

    Teletraffic performance of mobile cellular channel assignment using genetic algorithm by Kiong T.S., Ismail M., Hassan A.

    Published 2023
    “…The teletraffic performance is based on grade of service (GoS) of mobile cellular-system that can be predicted using Erlang-B and through simulation. …”
    Conference paper
  11. 11
  12. 12

    Development of mobile robot and localization system by Juhari, Khairul Anuar

    Published 2014
    “…Then the odometry corrections using a method called University of Massachusetts Benchmark (UMBmark ) method has been used to improve the encoder readings. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Mobile agent routing for query retrieval using genetic algorithm by Selamat, A., Selamat, M. H., Omatu, S.

    Published 2004
    “…Mobile agents often have a task to collect data from several predefined sites.This should be done in an efficient way by minimizing the elapsed time.Usually these agents only know the list of sites but not the distances between them.This paper proposes a method to minimize a network routing time taken by the mobile agents to collect information from different sites using genetic algorithm (GA).The mobile agents repeat travelling over short routes and avoid longer ones.Mobile agents for query retrieval have used the GA to select the best routes that minimize the query retrieval time.The result shows that the proposed method provides good time minimization in retrieving the query results by the mobile agents based on different GA parameters.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Adaptive route optimization for mobile robot navigation using evolutionary algorithm by Kit Guan Lim, Guan Lim, Yoong Hean Lee, Hean Lee, Min Keng Tan, Keng Tan, Hou, Pin Yoong, Tienlei, Wang, Tze, Kenneth Kin Teo

    Published 2021
    “…For example, Ant Colony Optimization (ACO) is an optimization algorithm based on swarm intelligence which is widely used to solve path planning problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  15. 15

    Development of floor mapping mobile robot algorithm using enhanced Artificial Neuro-Based SLAM (ANBS) by Khairul Anuar Juhari, Rizauddin Ramli, Sallehuddin Mohamed Haris, Zunaidi Ibrahim, Abdullah Zawawi Mohamed

    Published 2020
    “…The different controllers also can be used with this algorithm. For this research, the ANBS are tested on Hector SLAM and Gmapping SLAM where the output produced by each SLAM method is fed into the ANBS algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm by Natsheh, Essam Fathi

    Published 2006
    “…In the second method, fuzzy reasoning is used to optimize the maximum time period that can transpire before the node broadcast the ‘Hello” messages. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Novel algorithm for mobile robot path planning in constrained environment by Muhammad, Aisha, Ali, Mohammed A. H., Turaev, Sherzod, Shanono, Ibrahim Haruna, Hujainah, Fadhl, Mohd Zubir, Mohd Nashrul, Faiz, Muhammad Khairi, Mohd Faizal, Erma Rahayu, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2021
    “…In order to verify the performance of the developed method in dealing with constraints, an experimental study was carried out using a Wheeled Mobile Robot (WMR) platform in labs and roads. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article