Search Results - (( mobile applications mining algorithm ) OR ( web application testing algorithm ))*
Search alternatives:
- mobile applications »
- applications mining »
- application testing »
- testing algorithm »
- mining algorithm »
- web application »
-
1
-
2
Data mining in mobile ECG based biometric identification
Published 2014Get full text
Get full text
Get full text
Article -
3
-
4
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
5
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…Mobile data stream mining (MDSM) applications in MECC systems involve massive heterogeneity at application and platform levels. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
Published 2022“…Data classification has become the region of interest in Data Mining research as it indicates the arising of technology's application that leads to increment data usage. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Lastly, on the Testing phase two type of data has been used to test this web tool result. …”
Get full text
Get full text
Thesis -
11
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
12
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…Advanced forensic techniques become inevitable to investigate the malicious activities in Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific evidential artifact from the Mobile Cloud Computing (MCC) environment under forensically sound conditions. …”
Get full text
Get full text
Thesis -
13
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
Get full text
Get full text
Thesis -
14
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
15
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…This new improved approach is significant in helping web application developers to test their applications for all types of XSS and remove any detected vulnerabilities before releasing them to the public. …”
Get full text
Get full text
Get full text
Thesis -
16
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Web 2.0 is commonly associated with Web applications that facilitate interactive information sharing, interoperability, user-centred design, and collaboration utilizing of technology. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
Get full text
Get full text
Thesis -
18
MiMaLo: advanced normalization method for mobile malware detection
Published 2022“…This research used a malware behavior observe approach on device calls on mobile devices operating gadget kernel. An application used to be mounted on mobile gadget to gather facts and processed them to get dataset. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Design and evaluation on adaptive fuzzy speed control of mobile robot
Published 2011“…Wheeled mobile robots are widely used in various fields such as agriculture, industry, land mining, military, space explorations, and other applications in which the environment is inaccessible or hazardous to human, such as in nuclear plants. …”
Get full text
Get full text
Thesis
