Search Results - (( web application testing algorithms ) OR ( web application need algorithm ))
Search alternatives:
- application testing »
- testing algorithms »
- application need »
- web application »
- need algorithm »
-
1
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…Previous studies have not yet designed such a system that is reliable enough for such critical applications. This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
2
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
3
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application supports encoding and decoding images for concealing data in images. …”
Get full text
Get full text
Get full text
Article -
4
An ensemble feature selection method to detect web spam
Published 2018Get full text
Get full text
Get full text
Article -
5
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…The binary image of the extracted characters was fed to the CNN model for classification. In addition, a simple web application connected to Jupyter Notebook has been developed to perform the testing. …”
Get full text
Get full text
Student Project -
6
-
7
Job recruiting system using sorting Algorithm / Adi Asyraf Ayob
Published 2020“…The sorting algorithm will assist the recruiters in selecting best job candidate by assigning score to each applicants and sort the applicant list by the finest score value. …”
Get full text
Get full text
Thesis -
8
Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan
Published 2020“…The system uses the Rapid Application Development (RAD) methodology in system development and will be operate on a web-based platform. …”
Get full text
Get full text
Thesis -
9
Adopting Jaya Algorithm for Team Formation Problem
Published 2020“…This paper presents a simple and mighty metaheuristic algorithm, Jaya, which is applied to solve the team formation (TF) problem and it is a very fundamental problem in many databases and expert collaboration networks or web applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
A Requirement Model For Online Web-Based Car Loan Management System For UUM Bursary
Published 2008“…And they are facing many difficulties when they intend to fill the application form for car loan. Applicant has to fill data twice; therefore, take a long time and a large quantity of papers is needed. …”
Get full text
Get full text
Get full text
Thesis -
12
Smart Routing For Solid Waste Collection
Published 2023“…Finally, the conclusion highlights the accomplishments of the project, including the successful development of the route optimization algorithm and the web-based application. Limitations and constraints are identified, such as data availability and hardware limitations, which suggest areas for future work. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
-
14
SRcS: Smartphone Recommendation System using genetic algorithm / Nursalsabiela Affendy Azam
Published 2020“…Thus, the objective of the system is to design and develop a progressive web application (PWA) recommendation system for purchasing a smartphone by using genetic algorithm and test the system functionality. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
18
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…The prototype tool, called Second-order SQL injection Protector (SoSQLiP), was developed and implemented to test the proposed technique. The test was conducted using eleven PHP Web applications: ten applications available on the internet and that other researchers have used and one application that the researcher developed. …”
Get full text
Get full text
Thesis -
19
Conference Approval System (e-CoAS) / Nor Hidayah Rahim
Published 2015Get full text
Get full text
Thesis -
20
