Search Results - (( web applications _ algorithm ) OR ( code application ((means algorithm) OR (new algorithm)) ))
Search alternatives:
- web applications »
- code application »
- means algorithm »
- new algorithm »
-
1
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Static analysis techniques are good at detecting XSS vulnerabilities in the source codes of web applications, and especially when combined with other techniques. …”
Get full text
Get full text
Get full text
Thesis -
3
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
4
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
Get full text
Get full text
Thesis -
5
Job recruiting system using sorting Algorithm / Adi Asyraf Ayob
Published 2020“…The sorting algorithm will assist the recruiters in selecting best job candidate by assigning score to each applicants and sort the applicant list by the finest score value. …”
Get full text
Get full text
Thesis -
6
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Today, most web applications are vulnerable to SQL-injection attacks. …”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
Development of scalable video compression algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
10
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…A new detection algorithm based on QR decomposition, denoted as LC-QR, is proposed. …”
Get full text
Get full text
Thesis -
11
Optimization of coded signals based on wavelet neural network
Published 2015“…We performed evaluation using 13-bit, 35-bit and 69-bit Barker codes as signal codes to WNN. When compared with other existing methods, WNN yields better PSR, low Mean Square Error (MSE), less noise, range resolution ability and Doppler shift performance than the previous and some traditional algorithms like auto correlation function (ACF) algorithm.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
Get full text
Get full text
Student Project -
13
-
14
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…Then, a Machine Learning Algorithm (MLA) is used to train and test the data before a classifier is used to classify the new incoming dataset. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
Neural network-based codebook search for image compression
Published 2000Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
19
SLAMM: Visual monocular SLAM with continuous mapping using multiple maps
Published 2018“…In a single robot scenario the algorithm generates a new map at the time of tracking failure, and later it merges maps at the event of loop closure. …”
Get full text
Get full text
Article -
20
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. …”
Get full text
Get full text
Thesis
