Search Results - (( web applications a algorithm ) OR ( code application ((means algorithm) OR (new algorithm)) ))
Search alternatives:
- web applications »
- code application »
- means algorithm »
- applications a »
- new algorithm »
- a algorithm »
-
1
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
Get full text
Get full text
Get full text
Thesis -
3
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
4
Job recruiting system using sorting Algorithm / Adi Asyraf Ayob
Published 2020“…The purpose of this project is to develop a web-based job recruiting system with implementation of sorting algorithm. …”
Get full text
Get full text
Thesis -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Therefore, it is essential to develop a new technique to authenticate access to database related to web applications and prevent SQL injection vulnerabilities. …”
Get full text
Get full text
Get full text
Article -
6
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
Get full text
Get full text
Thesis -
7
-
8
Development of scalable video compression algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
9
-
10
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…A new detection algorithm based on QR decomposition, denoted as LC-QR, is proposed. …”
Get full text
Get full text
Thesis -
11
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…In this paper, we have proposed a new encryption and decryption system to solve the lack of data hiding problem. …”
Get full text
Get full text
Student Project -
12
Optimization of coded signals based on wavelet neural network
Published 2015“…We performed evaluation using 13-bit, 35-bit and 69-bit Barker codes as signal codes to WNN. When compared with other existing methods, WNN yields better PSR, low Mean Square Error (MSE), less noise, range resolution ability and Doppler shift performance than the previous and some traditional algorithms like auto correlation function (ACF) algorithm.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
-
14
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…Then, a Machine Learning Algorithm (MLA) is used to train and test the data before a classifier is used to classify the new incoming dataset. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
17
Neural network-based codebook search for image compression
Published 2000Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
SLAMM: Visual monocular SLAM with continuous mapping using multiple maps
Published 2018“…In a single robot scenario the algorithm generates a new map at the time of tracking failure, and later it merges maps at the event of loop closure. …”
Get full text
Get full text
Article -
20
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…In order to protect a web application from a malicious user, test procedures for identifying and removing SQLIVs must be implemented earlier in the software development life cycle (SDLC) of web applications, specifically before bringing it onto production and possibly becoming available to a malicious attack. …”
Get full text
Get full text
Thesis
