Search Results - (( mobile information data algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…When a user wants to send a file which contains confidential and important information, the user can protect the data inside the file by encrypting the data using the application developed using their mobile phones and send it to the person they intended to send the data. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks by Sanni, Mistura Laide, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Anwar, Farhat, Ahmed, Gharib Subhi Mahmoud

    Published 2015
    “…Mobility considerations in multicast algorithm design usually focus issues of mobile receivers while few researches emphasize on mobile multicast sources issues. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7
  8. 8

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  9. 9

    Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi by Mohd Khlubi, Aida Najihah

    Published 2019
    “…This paper analyzes how information sent through mobile messaging application is being secured. …”
    Get full text
    Get full text
    Student Project
  10. 10
  11. 11

    Multi-dimensional Data Visualisation using Mobile Augmented Reality by Rehman Ullah, Khan, Yin, Bee Oon, Ahmad Sofian, Shminan, Lee, Jun Choi, Chen, Jacqueline How Ting

    Published 2020
    “…This research proposes and develops a multi-display data visualisation algorithm using mobile augmented reality, as augmented reality (AR) is beyond the two-dimensional screen. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Mobile technology generations and cryptographic algorithms: analysis study by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2016
    “…This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Performance evaluation of marker recognition algorithm for mobile augmented reality in the real environment by Siok, Yee Tan, Haslina Arshad

    Published 2023
    “…BRISK detector, FREAK descriptor, and Hamming distance matcher algorithms are implemented in a mobile AR application in order to evaluate the AR algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A hybrid controller method with genetic algorithm optimization to measure position and angular for mobile robot motion control by Shamsudin, Shamsudin, Mohamaddan, Shahrol

    Published 2023
    “…Due to the complexity of autonomous mobile robot’s requirement and drastic technological changes, the safe and efficient path tracking development is becoming complex and requires intensive knowledge and information, thus the demand for advanced algorithm has rapidly increased. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Data synchronization model for heterogeneous mobile databases and server-side database by Imam, A.A., Basri, S., Ahmad, R., Gilal, A.R.

    Published 2018
    “…Also existing models and algorithms are classified, protracted and applied. All database peculiar information, such as trigger, timestamp and meta-data are eliminated. …”
    Get full text
    Get full text
    Article
  17. 17

    Data synchronization model for heterogeneous mobile databases and server-side database by Imam, A.A., Basri, S., Ahmad, R., Gilal, A.R.

    Published 2018
    “…Also existing models and algorithms are classified, protracted and applied. All database peculiar information, such as trigger, timestamp and meta-data are eliminated. …”
    Get full text
    Get full text
    Article
  18. 18

    Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm by Rahman, MZA, Madihah Mohd Saudi

    Published 2024
    “…Nowadays smart phone has been used all over the world and has become as one of the most targeted platforms of mobile botnet to steal confidential information especially related with online banking. …”
    Proceedings Paper
  19. 19

    Mobile agent routing for query retrieval using genetic algorithm by Selamat, A., Selamat, M. H., Omatu, S.

    Published 2004
    “…Mobile agents often have a task to collect data from several predefined sites.This should be done in an efficient way by minimizing the elapsed time.Usually these agents only know the list of sites but not the distances between them.This paper proposes a method to minimize a network routing time taken by the mobile agents to collect information from different sites using genetic algorithm (GA).The mobile agents repeat travelling over short routes and avoid longer ones.Mobile agents for query retrieval have used the GA to select the best routes that minimize the query retrieval time.The result shows that the proposed method provides good time minimization in retrieving the query results by the mobile agents based on different GA parameters.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20