Search Results - (( mobile information data algorithm ) OR ( java application based algorithm ))
Search alternatives:
- mobile information »
- application based »
- information data »
- java application »
- data algorithm »
-
1
-
2
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
Get full text
Get full text
Thesis -
5
Secure mobile AES encryptor (SMAE)
Published 2016“…When a user wants to send a file which contains confidential and important information, the user can protect the data inside the file by encrypting the data using the application developed using their mobile phones and send it to the person they intended to send the data. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Mobility considerations in multicast algorithm design usually focus issues of mobile receivers while few researches emphasize on mobile multicast sources issues. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Book recommender mobile application / Amir Imran Kamaludin
Published 2021Get full text
Get full text
Thesis -
8
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
9
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…This paper analyzes how information sent through mobile messaging application is being secured. …”
Get full text
Get full text
Student Project -
10
Systematic analysis on mobile botnet detection techniques using genetic algorithm
Published 2024Conference Paper -
11
Multi-dimensional Data Visualisation using Mobile Augmented Reality
Published 2020“…This research proposes and develops a multi-display data visualisation algorithm using mobile augmented reality, as augmented reality (AR) is beyond the two-dimensional screen. …”
Get full text
Get full text
Get full text
Article -
12
Mobile technology generations and cryptographic algorithms: analysis study
Published 2016“…This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Performance evaluation of marker recognition algorithm for mobile augmented reality in the real environment
Published 2023“…BRISK detector, FREAK descriptor, and Hamming distance matcher algorithms are implemented in a mobile AR application in order to evaluate the AR algorithm. …”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
A hybrid controller method with genetic algorithm optimization to measure position and angular for mobile robot motion control
Published 2023“…Due to the complexity of autonomous mobile robot’s requirement and drastic technological changes, the safe and efficient path tracking development is becoming complex and requires intensive knowledge and information, thus the demand for advanced algorithm has rapidly increased. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Data synchronization model for heterogeneous mobile databases and server-side database
Published 2018“…Also existing models and algorithms are classified, protracted and applied. All database peculiar information, such as trigger, timestamp and meta-data are eliminated. …”
Get full text
Get full text
Article -
20
Data synchronization model for heterogeneous mobile databases and server-side database
Published 2018“…Also existing models and algorithms are classified, protracted and applied. All database peculiar information, such as trigger, timestamp and meta-data are eliminated. …”
Get full text
Get full text
Article
