Search Results - (( phone applications among algorithm ) OR ( web implications _ algorithm ))
Search alternatives:
- phone applications »
- applications among »
- web implications »
- among algorithm »
-
1
-
2
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…Unfortunately, the abundance of mobile applications and lax management of some app stores has led to potential risks for mobile users, including privacy breaches and malicious deductions of fees, among other adverse consequences. …”
Get full text
Get full text
Thesis -
3
Analysis On QOS Parameters To Predict Http Response
Published 2017“…Therefore, the real live world web service label data uses to evaluate the focus parameters using classification machine learning algorithms to process the data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…Cross-site scripting vulnerabilities are among the top ten security vulnerabilities affecting web applications for the past decade and mobile version web applications more recently. …”
Get full text
Get full text
Get full text
Article -
5
Web-based marketing communication to develop brand image and brand equity of higher educational institutions: a structural equation modelling approach
Published 2019“…Research limitations/implications – Future research can be done considering both online and conventional marketing communications for the same purpose. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies
Published 2008“…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
Get full text
Get full text
Thesis -
7
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
8
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
9
Sony applicant recruitment system using fuzzy logic / Nik Zurifa Nabilah Zulkifli
Published 2022“…Fuzzy Logic algorithms have adapted to fit a wide range of uses. …”
Get full text
Get full text
Thesis -
10
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
11
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Development of eCall for Malaysia's automotive industries
Published 2019Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…As many human currently depend on technologies to assist with daily tasks, there are more and more applications which have been developed to be fit in one small gadget such as smart phone and tablet. …”
Get full text
Get full text
Thesis -
15
-
16
Social media in shaping public opinion roles and impact: a systematic review
Published 2024“…This systematic literature review examines the impact of social media on public opinion and its implications for policy-making. Utilising the PRISMA framework, the study analysed 19 articles from Scopus and Web of Science databases published between 2013-2023. …”
Get full text
Get full text
Get full text
Article -
17
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Content-based indexing of low resolution documents
Published 2016“…The algorithm has the capability of reducing any shortcoming associated with normalisation in initial fusion technique. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Deterministic phase sequence approach for peak to average power ratio reduction in orthogonal frequency division multiplexing systems
Published 2016“…Simplicity of the search algorithm, and the requirement for large numbers of Inverse Fast Fourier Transform (IFFT) blocks are the most important advantage and disadvantage of the CSLM scheme, respectively. …”
Get full text
Get full text
Thesis
