Search Results - (( phone applications among algorithm ) OR ( web implications _ algorithm ))

Refine Results
  1. 1
  2. 2

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…Unfortunately, the abundance of mobile applications and lax management of some app stores has led to potential risks for mobile users, including privacy breaches and malicious deductions of fees, among other adverse consequences. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Analysis On QOS Parameters To Predict Http Response by A.Rahman, Khairulnizam

    Published 2017
    “…Therefore, the real live world web service label data uses to evaluate the focus parameters using classification machine learning algorithms to process the data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…Cross-site scripting vulnerabilities are among the top ten security vulnerabilities affecting web applications for the past decade and mobile version web applications more recently. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Web-based marketing communication to develop brand image and brand equity of higher educational institutions: a structural equation modelling approach by Momen, Md. Abdul, Sultana, Seyama, Haque, A. K. M. Ahasanul

    Published 2019
    “…Research limitations/implications – Future research can be done considering both online and conventional marketing communications for the same purpose. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Sony applicant recruitment system using fuzzy logic / Nik Zurifa Nabilah Zulkifli by Zulkifli, Nik Zurifa Nabilah

    Published 2022
    “…Fuzzy Logic algorithms have adapted to fit a wide range of uses. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…As many human currently depend on technologies to assist with daily tasks, there are more and more applications which have been developed to be fit in one small gadget such as smart phone and tablet. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Social media in shaping public opinion roles and impact: a systematic review by Dasad Latif, Muhammad Ahsan Samad, Rinawulandari, Shamsiah Abd Kadir

    Published 2024
    “…This systematic literature review examines the impact of social media on public opinion and its implications for policy-making. Utilising the PRISMA framework, the study analysed 19 articles from Scopus and Web of Science databases published between 2013-2023. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An automated approach to elicit and validate security requirements of mobile application by Yusop, Noorrezam

    Published 2018
    “…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…The algorithm has the capability of reducing any shortcoming associated with normalisation in initial fusion technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Deterministic phase sequence approach for peak to average power ratio reduction in orthogonal frequency division multiplexing systems by Kazemian, Mohsen

    Published 2016
    “…Simplicity of the search algorithm, and the requirement for large numbers of Inverse Fast Fourier Transform (IFFT) blocks are the most important advantage and disadvantage of the CSLM scheme, respectively. …”
    Get full text
    Get full text
    Thesis