Search Results - (( java implementation level algorithm ) OR ( ((using code) OR (using mobile)) using algorithm ))

Refine Results
  1. 1

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…The QR code was used as a mechanism to activating the function for mobile application and determining the location, while EAN-13 barcode was used as a product identification. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The optimization on ANPR was performed on the pre-processing step using our own Java code as currently there is no image processing library available on the standard Android mobile phone. …”
    Get full text
    Get full text
    Get full text
    Book
  5. 5

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…XSS-DETREM has been evaluated empirically using a data set of JSP and Android web applications that have been used in previous studies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Artificial intelligent power prediction for efficient resource management of WCDMA mobile network by Tee Y.K., Tinng S.K., Koh J., David Y.

    Published 2023
    “…The output of SVR will be used by WCDMA mobile network to decide on new service admission. …”
    Conference Paper
  8. 8

    Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm by Rahman, MZA, Madihah Mohd Saudi

    Published 2024
    “…Furthermore, this paper also discusses the challenges and the potential research for future work with relate of the genetic algorithm. This research paper can be used as a reference and guidance for further study on mobile botnet detection techniques.…”
    Proceedings Paper
  9. 9

    PAPR and BER analysis of mobile WiMAX system using QC-LDPC code with STFBC MIMO OFDMA system / Siti Nor Hasima Mat Jusoh by Mat Jusoh, Siti Nor Hasima

    Published 2014
    “…Th e main diversity type is space, time and frequency. MATLAB software is use to develop new Quasi Cyclic LDPC block code algorithm and determine PAPR reduction for the STFBC MIMO-OFDMA system. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Error performance in BCH codes / Zurina Mohamed by Mohamed, Zurina

    Published 2003
    “…This thesis covers the theoretical and the practical design of the BCH codes. The theoretical part covers the algorithms used, how they are encoded and decoded and how they are used to correct errors. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Mobile app of mood prediction based on menstrual cycle using machine learning algorithm / Nur Hazirah Amir by Amir, Nur Hazirah

    Published 2019
    “…The template design was built using Node.js and Visual Code Studio. And it used Cordova for designing interface. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Improving the security of mobile IPV6 signalling using KECCAK / SHA-3 by Supriyanto Praptodiyono, Teguh Firmansyah, Raja Kumar Murugesan, Mudrik Alaydrus, Randy Aprilia, Leau, Yu-Beng

    Published 2021
    “…The conventional IPsec uses Keyed-Hash Message Authentication Code-Secure Hash Algorithm-1 (HMAC-SHA-1) to authenticate signalling messages. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Implementation of RBG-HS-CbCr skin colour model using mobile python PyS60 by Ngui,, Lin Hui.

    Published 2009
    “…The programming language used in this project is Mobile Python or PyS60 and the written source code is executed on the S60 device mobile platform, whic h is the Nokia N95 in this case. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  17. 17

    Hybrid artificial intelligent algorithm for call admission control in WCDMA mobile network by Tee Y.K., Tiong S.K., Johnny K.S.P., Yeoh E.C.

    Published 2023
    “…The predicted output is used by WCDMA mobile network to make decision on new service request admission. …”
    Conference paper
  18. 18

    PID controller design for a twin rotor MIMO system using real coded GA optimisation by Toha, Siti Fauziah, Tokhi, M. Osman

    Published 2009
    “…This paper presents a scrutinized investigation to control the rigid body motion of a laboratory scale helicopter, a twin rotor multi input multi output system (TRMS), using PID control. The controller is optimized using a real-coded genetic algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis