Search Results - (( web application testing algorithm ) OR ( phone application using algorithms ))
Search alternatives:
- application testing »
- testing algorithm »
- phone application »
- using algorithms »
- web application »
-
1
Secure mobile AES encryptor (SMAE)
Published 2016“…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…Increasing use of mobile phones to access web applications increases the threat of cross-site scripting attacks on mobile phones. …”
Get full text
Get full text
Get full text
Article -
3
SRcS: Smartphone Recommendation System using genetic algorithm / Nursalsabiela Affendy Azam
Published 2020“…Thus, the objective of the system is to design and develop a progressive web application (PWA) recommendation system for purchasing a smartphone by using genetic algorithm and test the system functionality. …”
Get full text
Get full text
Thesis -
4
Objects tracking from natural features in mobile augmented reality
Published 2013“…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
Get full text
Get full text
Get full text
Article -
5
Monitoring cathodic protection system for underground pipeline
Published 2013“…As the world is emerging into mobile technology, an innovative plan was made to combine traditional monitoring system into smart phones mobile application. An electronic prototype were designed, fabricated and tested to monitor the pipelines drain point voltage, transformer rectifier voltage, shunt current, humidity and temperature using a local server system whereby all the data collected are stored on a local storage before synchronizing to the internet’s web server database using the cloud system. …”
Get full text
Get full text
Thesis -
6
-
7
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
8
-
9
-
10
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
11
Optimization of ANPR algorithm on android mobile phone
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
12
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Lastly, on the Testing phase two type of data has been used to test this web tool result. …”
Get full text
Get full text
Thesis -
13
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
14
-
15
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
Get full text
Get full text
Thesis -
16
The child tracker using location awareness / Muhammad Idham Amdan
Published 2017“…In this paper, the aim of proposed conceptual smartphone tracker framework is to provide mobile phone security and to locate ability of device in form of mobile application.…”
Get full text
Get full text
Thesis -
17
Development of mobile robot controlled by android phone via Bluetooth
Published 2015“…The robot is controlled wirelessly using the Bluetooth feature which is present in all android smart phones. …”
Get full text
Get full text
Student Project -
18
Development of mobile robot controlled by android phone via Bluetooth: article
Published 2015“…The robot is controlled wirelessly using the Bluetooth feature which is present in all android smart phones. …”
Get full text
Get full text
Article -
19
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
20
