Search Results - (( _ applications out algorithm ) OR ( web application testing algorithm ))*

Refine Results
  1. 1

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Defect green coffee bean detection using image recognition and supervised learning by Shafian Izan Sofian

    Published 2022
    “…This integrated web application is tested with functionality test and integration test which it succeeded both successfully fulfilling each criterion tested.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  3. 3

    Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud by Mahmud, Nur Farahana

    Published 2022
    “…The binary image of the extracted characters was fed to the CNN model for classification. In addition, a simple web application connected to Jupyter Notebook has been developed to perform the testing. …”
    Get full text
    Get full text
    Student Project
  4. 4
  5. 5

    Re: Gen - web-based resume generator with content recommender for it job field / Nurul Syahmina Mohd Khairuddin … [et al.] by Mohd Khairuddin, Nurul Syahmina, Ahmadon, Fadzlin, Hashim, Madihah Hannani, Mohd Vauxhall, Nur Ain Emylia

    Published 2022
    “…Web-based is the platform chosen for this application to develop on as it is more faster and user-friendly application creation for desktop and mobile devices. …”
    Get full text
    Get full text
    Get full text
    Book Section
  6. 6
  7. 7

    Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques by Tri Ginanjar Laksana, Ade Rahmat Iskandar, Wan Nooraishya Wan Ahmad

    Published 2024
    “…Next the outcomes of the Forward Chaining algorithm test. All questions about symptoms were answered affirmatively, except for one test which had a negative response. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Real time traceability module for halal logistic transportation using GPS and geofence technique by Mohamad, Maizatul Akma

    Published 2016
    “…A comparison of performance and result of the geofence technique and Family Locator application, developed by Sygic, was made. A user acceptance test has been implemented and most of the respondents agreed that this module will benefit the Halal logistic provider in providing data on real time traceability. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…The system consist of a central database and organized into web page application which can be accessed by system admin, certificate user, and employer. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Car license plate detection method for Malaysian plates-styles by using a web camera by Al-Ghaili, Abbas Mohammed Ali, Mashohor, Syamsiah, Ramli, Abdul Rahman, Ismail, Alyani

    Published 2010
    “…The images are taken using a web camera for both the systems. One of the most important contributions in this paper is that the proposed CLPD method uses Vertical Edge Detection Algorithm (VEDA) to extract the vertical edges of plates. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Process of model based slicing is utilized to extract the desired lump out of slice diagram. This specific survey focuses on slicing techniques in the fields of numerous programing paradigms like web applications, object oriented, and components based. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Lastly, on the Testing phase two type of data has been used to test this web tool result. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan by Wan Chik, Wan Adnan

    Published 2006
    “…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Article
  20. 20

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…This new improved approach is significant in helping web application developers to test their applications for all types of XSS and remove any detected vulnerabilities before releasing them to the public. …”
    Get full text
    Get full text
    Get full text
    Thesis