Search Results - (( mobile application towards algorithm ) OR ( web application using algorithms ))*
Search alternatives:
- towards algorithm »
- using algorithms »
- web application »
-
1
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…Increasing use of mobile phones to access web applications increases the threat of cross-site scripting attacks on mobile phones. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Online zakat application system for UiTM Tapah using fuzzy logic / Maizatul Asyikin Mokhtar
Published 2016“…This research is about the application of fuzzy logic algorithm in applying zakat. …”
Get full text
Get full text
Thesis -
4
A Review of Multi-criteria Decision-Making Methods Using Application of Variable Weight Theory and IF-TOPSIS-EF
Published 2021“…This paper represents the methodology to conduct a research that aims to combine two methods (IFS-TOPSIS-exponential based and Variable Weight Theory) in a new technique that tackles the abovementioned gaps by following induction research approach to validate the new technique by utilizing the secondary data, then to use interviews to develop the mobile application algorithm to perform solving MCDM problems virtually.…”
Get full text
Get full text
Get full text
Book Chapter -
5
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…The rapid growth of web and mobile technologies has allowed people to access E-Learning content from heterogeneous client devices. …”
Get full text
Get full text
Thesis -
6
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
7
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
8
-
9
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…This paper presents the design and implementation of a crypto processor, a special-purpose embedded system optimized for the execution of cryptographic algorithms in hardware. This cryptosystem can be used in wide range of electronic devices, which include PCs, PDAs, wireless handsets, smart cards, hardware security modules, network appliances, such as routers, gateways, firewalls, storage and web servers. …”
Get full text
Get full text
Get full text
Article -
10
Text Extraction Algorithm for Web Text Classification
Published 2010“…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
11
Development of coordinating algorithm for rendezvous task of mobile robots
Published 2023“…The coordination of mobile robots is a crucial component in a variety of applications, including search and rescue, environmental monitoring, and transportation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
13
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
14
-
15
A Modified Hybrid Fuzzy Controller for Real-Time Mobile Robot Navigation
Published 2023Conference Paper -
16
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…To date, many works have been addressed in investigating the use of data mining techniques (e.g., Clustering) in Web page application. …”
Get full text
Get full text
Get full text
Thesis -
17
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…The diversity of multimedia presentation environment sets strict requirements for multimedia applications and systems. Since the invention of the computer, content has been tailored towards a specific device, mainly by hand. …”
Get full text
Get full text
Thesis -
18
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…The development on Web Application system uses An ActiveX technology approach. …”
Get full text
Get full text
Thesis -
19
An algorithm for navigation of mobile robots in cluttered environments
Published 2013Get full text
Get full text
Article -
20
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…Application of data mining techniques to the World Wide Web referred as Web mining where this term has been used in three distint ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis
