Search Results - (( program mobile data algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…To achieve mobility control in Mobile IP networks, a new linear programming formulation for guaranteeing the optimality of data transmission and network connectivity is proposed. …”
    Get full text
    Get full text
    Thesis
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…Such methodology can be achieved by java programming language for mobile clients J2ME, and by using a second generation mobile phones. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  8. 8

    Security mechanism for wireless Mobile Ad Hoc Networks (MANET) by Abdul Rahman Sidek, Diana

    Published 2006
    “…These algorithms are chosen because they are suitable for low bit rate data. …”
    Get full text
    Get full text
    Student Project
  9. 9
  10. 10

    Trajectory tracking control of two wheels mobile robot by Abd Ghani, N. M., Raja Ismail, R. M.T., Noordin, Nurul Hazlina, Ahmad, Mohd Ashraf

    Published 2011
    “…As a result of combination between line follower program and internal self balancing algorithms, we able to develop a dynamically stabilized Balbot with line follower function.…”
    Get full text
    Get full text
    Research Report
  11. 11
  12. 12
  13. 13
  14. 14

    A framework for GPU-accelerated AES-XTS encryption in mobile devices by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam

    Published 2011
    “…One important application area that can benefit from GPUs power is storage encryption in mobile devices. In this paper, we introduce a GPU-accelerated framework for storage encryption in mobile devices using the XTS-AES encryption algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Trajectory tracking control of two wheels mobile robot = trajektori kawalan penjejakan sistem robot dua tayar by Normaniha, Abdul Ghani, Raja Mohd Taufika , Raja Ismail, Nurul Hazlina, Noordin, Mohd Ashraf, Ahmad

    Published 2011
    “…As a result of combination between line follower program and internal self balancing algorithms, we able to develop a dynamically stabilized Balbot with line follower function.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…The password system is also recommended as a viable solution for this authentication as its implementation is most convenient for mobile users. A password algorithm is proposed from which a program can be written in any language deemed suitable.…”
    Get full text
    Get full text
    Thesis
  19. 19

    MMS : mobile monitoring system using electrical capacitance tomography (ECT) by Abdul Rahim, Ruzairi, Chan, Kok Seong

    Published 2008
    “…In order to improve data result, iterative algorithm has been implemented in this system in order to obtain a precise image of the flow in the pipeline.…”
    Get full text
    Get full text
    Monograph
  20. 20

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis