Search Results - (( mobile application during algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8
  9. 9
  10. 10

    Improved autonomous charging of mobile multi-robots using honeybee-inspired algorithm by Ahmad@Mohd Yusoff, Faisul Arif

    Published 2016
    “…It is also known as application that applies large number of mobile robot. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A framework of rough cultural algorithms in optimizing mobile web caching performance by Sulaiman, Sarina, Shamsuddin, Siti Maryam, Abraham, Ajith, Sulaiman, Shahida

    Published 2007
    “…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
    Get full text
    Get full text
    Article
  12. 12

    A new efficient checkpointing algorithm for distributed mobile computing by Mansouri, Houssem, Badache, Nadjib, Aliouat, Makhlouf, Pathan, Al-Sakib Khan

    Published 2015
    “…This algorithm is characterized by its efficiency and optimization in terms of incurred time-space overhead during checkpointing process and normal application running period.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…Mobility allows mobile node to communicate even distances away without restarting any applications in use. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Modelling of Crowd Evacuation with Communication Strategy Using Social Force Model by Norhaida, Hussain, Wai Shiang, Cheah

    Published 2022
    “…As mobile crowd steering applications require user interaction during fire evacuation, we have foreseen a gap in current simulation algorithms, which leads to unrealistic simulation. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis