Search Results - (( web application ((bee algorithm) OR (_ algorithm)) ) OR ( mobile applications new algorithm ))

Refine Results
  1. 1

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Also, as more users are browsing the Internet through their mobile applications, this approach will help in protecting their private data and make browsing safer for them with both Desktop and Mobile web applications.…”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
    Proceedings Paper
  3. 3

    Route planner mobile web application for UiTM Malaysia / Suzana Ahmad ... [et al.] by Ahmad, Suzana, Mat Diah, Norizan, Mohamad Kamal, Nor Ashikin, Mohd Jailani, Siti Zalekha

    Published 2009
    “…A Route Planner Mobile Web Application for UiTM Malaysia has been developed to produce a list of routes from two selected points in order of the shortest first. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony by Mohd Izuddin Sipluk

    Published 2022
    “…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7
  8. 8
  9. 9

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. The result of the algorithm performance will be appeared in web application system. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10

    Objects tracking from natural features in mobile augmented reality by Ng, Edmund Giap Weng, Rehman, Ullah Khan, Shahren, Ahmad Zaidi Adruce, Oon, Yin Bee

    Published 2013
    “…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Lightweight Cryptography Techniques for MHealth Cybersecurity by Shahbodin, F, Azni, AH, Ali, T, Mohd, CKNCK

    Published 2024
    “…A new integration of wireless communication technologies into the mobile heath system also known as mHealth has instigated a momentous research interest in the field of mobile security. mHealth systems are unique in terms of characteristics, challenges, architecture, and applications. …”
    Proceedings Paper
  13. 13

    A Review of Multi-criteria Decision-Making Methods Using Application of Variable Weight Theory and IF-TOPSIS-EF by Ayasrah, Omar, Faiz, Mohd Turan

    Published 2021
    “…This paper represents the methodology to conduct a research that aims to combine two methods (IFS-TOPSIS-exponential based and Variable Weight Theory) in a new technique that tackles the abovementioned gaps by following induction research approach to validate the new technique by utilizing the secondary data, then to use interviews to develop the mobile application algorithm to perform solving MCDM problems virtually.…”
    Get full text
    Get full text
    Get full text
    Book Chapter
  14. 14
  15. 15

    Online zakat application system for UiTM Tapah using fuzzy logic / Maizatul Asyikin Mokhtar by Maizatul Asyikin, Mokhtar

    Published 2016
    “…This research is about the application of fuzzy logic algorithm in applying zakat. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    A new efficient checkpointing algorithm for distributed mobile computing by Mansouri, Houssem, Badache, Nadjib, Aliouat, Makhlouf, Pathan, Al-Sakib Khan

    Published 2015
    “…Such instability poses serious challenge for fault tolerant distributed mobile applications. Therefore, the classical checkpointing techniques, which make the applications more failure-resistant, are not always compatible with the mobile context. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20