Search Results - (( web application new algorithm ) OR ( phone application testing algorithm ))*

Refine Results
  1. 1
  2. 2

    A new algorithm to measure relevance among Web pages by Sadi, M.S., Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2006
    “…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Genetic case-based reasoning for improved mobile phone faults diagnosis by Mohammed, Mazin Abed, Abd Ghani, Mohd Khanapi, Arunkumar, N., Obaid, Omar Ibrahim, A. Mostafa, Salama, Musa Jaber, Mustafa, Burhanuddin, M.A., Mohammed Matar, Bilal, Abdullatif, Saif Khalid, Ahmed Ibrahim, Dheyaa

    Published 2018
    “…GCBR is implemented in a mobile phone fault diagnosis application. This domain is a good testing environment because mobile phones are of various types and models. …”
    Get full text
    Get full text
    Article
  6. 6

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…On the other hand, the proper testing of the application is done to ensure that there is a proper user satisfaction level of the users of the application. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9
  10. 10
  11. 11
  12. 12

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the web pages of an application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  19. 19

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  20. 20

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
    Get full text
    Get full text
    Thesis