Search Results - (( web application testing algorithm ) OR ( its application need algorithm ))*
Search alternatives:
- application testing »
- testing algorithm »
- application need »
- web application »
- its application »
- need algorithm »
-
1
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
2
Adopting Jaya Algorithm for Team Formation Problem
Published 2020“…This paper presents a simple and mighty metaheuristic algorithm, Jaya, which is applied to solve the team formation (TF) problem and it is a very fundamental problem in many databases and expert collaboration networks or web applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application supports encoding and decoding images for concealing data in images. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
Get full text
Get full text
Get full text
Article -
6
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…The prototype tool, called Second-order SQL injection Protector (SoSQLiP), was developed and implemented to test the proposed technique. The test was conducted using eleven PHP Web applications: ten applications available on the internet and that other researchers have used and one application that the researcher developed. …”
Get full text
Get full text
Thesis -
7
-
8
Breast Cancer Diagnosis Using Neuro-CBR Approach
Published 2005Get full text
Get full text
Get full text
Thesis -
9
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
10
Enhancing geographic coordinates representation standard for reverse geocoding web services
Published 2018“…These days, regardless of Geographic Information System (GIS) and Spatial Data Infrastructure (SDI), reverse-geocoding web services provide the backbone of many of web, mobile, and Internet-of-Things (IoT) applications. …”
Get full text
Get full text
Thesis -
11
Computerized welding process selection and parameter determination
Published 2010“…On the other hand, a prototype of the proposed system was developed and deployed by using Oracle Application Express version 3.2 as a web page developer tool and Oracle Database 11g as data storage application. …”
Get full text
Get full text
Thesis -
12
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
13
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Lastly, on the Testing phase two type of data has been used to test this web tool result. …”
Get full text
Get full text
Thesis -
14
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
15
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
Get full text
Get full text
Thesis -
16
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
17
Skin Colour Detection Based On An Adaptive Multi-Thresholding Technique
Published 2007“…The results show that when processing images of different people taken in different imaging conditions, the use of only one single threshold value is not adapted, and since the proposed method is capable of adaptively adjusting its threshold values and effectively separating skin colour regions from non skin ones, it is applicable to images with various conditions. …”
Get full text
Get full text
Thesis -
18
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…This new improved approach is significant in helping web application developers to test their applications for all types of XSS and remove any detected vulnerabilities before releasing them to the public. …”
Get full text
Get full text
Get full text
Thesis -
19
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Web 2.0 is commonly associated with Web applications that facilitate interactive information sharing, interoperability, user-centred design, and collaboration utilizing of technology. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
Get full text
Get full text
Thesis
