Search Results - (( mobile applications new algorithm ) OR ( web application using algorithm ))*

Refine Results
  1. 1

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…XSS-DETREM has been evaluated empirically using a data set of JSP and Android web applications that have been used in previous studies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
    Proceedings Paper
  3. 3

    Route planner mobile web application for UiTM Malaysia / Suzana Ahmad ... [et al.] by Ahmad, Suzana, Mat Diah, Norizan, Mohamad Kamal, Nor Ashikin, Mohd Jailani, Siti Zalekha

    Published 2009
    “…A Route Planner Mobile Web Application for UiTM Malaysia has been developed to produce a list of routes from two selected points in order of the shortest first. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
    Get full text
    Get full text
    Student Project
  9. 9

    A Review of Multi-criteria Decision-Making Methods Using Application of Variable Weight Theory and IF-TOPSIS-EF by Ayasrah, Omar, Faiz, Mohd Turan

    Published 2021
    “…This paper represents the methodology to conduct a research that aims to combine two methods (IFS-TOPSIS-exponential based and Variable Weight Theory) in a new technique that tackles the abovementioned gaps by following induction research approach to validate the new technique by utilizing the secondary data, then to use interviews to develop the mobile application algorithm to perform solving MCDM problems virtually.…”
    Get full text
    Get full text
    Get full text
    Book Chapter
  10. 10

    Online zakat application system for UiTM Tapah using fuzzy logic / Maizatul Asyikin Mokhtar by Maizatul Asyikin, Mokhtar

    Published 2016
    “…This research is about the application of fuzzy logic algorithm in applying zakat. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    A new efficient checkpointing algorithm for distributed mobile computing by Mansouri, Houssem, Badache, Nadjib, Aliouat, Makhlouf, Pathan, Al-Sakib Khan

    Published 2015
    “…Such instability poses serious challenge for fault tolerant distributed mobile applications. Therefore, the classical checkpointing techniques, which make the applications more failure-resistant, are not always compatible with the mobile context. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20