Search Results - (( wave application ((_ algorithm) OR (bat algorithm)) ) OR ( web application model algorithm ))*

Refine Results
  1. 1

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2
  3. 3

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
    Get full text
    Get full text
    Research Reports
  4. 4

    Car dealership web application by Yap, Jheng Khin

    Published 2022
    “…The web service performed model explaining and monitoring by querying the application data from the Azure SQL Database. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…Finally, the model was pickled and loaded into the web application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    A web usage mining approach based on LCS algorithm in online predicting recommendation systems by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2008
    “…Online prediction is one Web Usage Mining application. However, the accuracy of the prediction and classification in the current architecture of predicting users' future requests systems can not still satisfy users especially in huge Web sites. …”
    Get full text
    Get full text
    Article
  10. 10

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…They differ in amount of found EW patterns, quality and size. The following application of the developed detection algorithm was based on recognition of an incomplete EW patterns with aim of the prediction of the following progress of the time set. …”
    Get full text
    Get full text
    Article
  15. 15

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…They differ in amount of found EW patterns, quality and size. The following application of the developed detection algorithm was based on recognition of an incomplete EW patterns with aim of the prediction of the following progress of the time set. …”
    Get full text
    Get full text
    Article
  16. 16

    Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy by Madzzaini, Nur Sofea Eleena

    Published 2017
    “…Usually, one sinusoidal wave is used for one inverter. In this design, SPWM is used for multilevel inverter application in photovoltaic (PV) system. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Fake news detection: A machine learning approach by Yeoh, Dennis Guan Lee

    Published 2021
    “…Finally, a web application was developed to deploy the trained model. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18
  19. 19

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
    Get full text
    Get full text
    Thesis
  20. 20