Search Results - (( web application a algorithm ) OR ( code application among algorithms ))*
Search alternatives:
- application among »
- code application »
- among algorithms »
- web application »
- application a »
- a algorithm »
-
1
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
Get full text
Get full text
Thesis -
2
Handheld devices 3D video streaming compression algorithm / Mohamad Taib Miskon, Hamidah Jantan and Wan Ahmad Khusairi Wan Chek
Published 2016“…In recent years, a Three Dimensional Discrete Cosine Transform (3D-DCT) coding algorithm has been developed for compression of still 3D integral images [8-10], The main benefit of using transform coding is that integral 3D images are inherently divided into small non-overlapping…”
Get full text
Get full text
Research Reports -
3
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
Get full text
Get full text
Thesis -
4
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…Numerous data security and hiding algorithms have been developed in the last decade. Online attacks have increased to a large extent nowadays and the most common attack among them is data abuse . …”
Get full text
Get full text
Student Project -
5
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
6
-
7
Classifying good and bad websites
Published 2015“…Websites classification has become a vital subject matter as most websites are increasingly being used as a platform for various applications. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
-
9
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
10
Phishing image spam classification research trends: Survey and open issues
Published 2020“…A phishing email is an attack that focused completely on people to circumvent existing traditional security algorithms. …”
Get full text
Get full text
Article -
11
-
12
Text Extraction Algorithm for Web Text Classification
Published 2010“…It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
13
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
14
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…The Web Application System program is designed for the client to configure a system (e.g calculates a load flow). …”
Get full text
Get full text
Thesis -
15
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…In order to tackle above problem, a modified algorithm for Web page recommendation is proposed. …”
Get full text
Get full text
Get full text
Thesis -
16
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
17
A web-based implementation of k-means algorithms
Published 2022“…Furthermore, the web application could save the users’ past work, so that they may resume their work at a later time without skipping a beat.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
20
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Web Usage Mining (WUM) systems are specifically designed to carry out this task by analyzing the data representing usage data about a particular Web site. …”
Get full text
Get full text
Article
