Search Results - (( web applications path algorithm ) OR ( code application using algorithmic ))*

Refine Results
  1. 1

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…The test was conducted using eleven PHP Web applications: ten applications available on the internet and that other researchers have used and one application that the researcher developed. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software by Nik Yusoff, Nik Mohd Ramli

    Published 2014
    “…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    A Dijkstra’s Mobile Web Application Engine for Generating Integrated Light Rail Transit Route by Haziq Lim, AM, Wan Sazli, NS, Hussin, B., Azlianor, A. A., Suhaizan, SM, Massila, K

    Published 2010
    “…In previous research we are implemented the mobile web application using rules based algorithm where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…A Quick Response (QR) code is a popular type of two-dimensional barcode that is widely used in various applications. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…This application handle execution of anonymous code that could be malicious securely by running the code in an isolate environment. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Optimization of LRT Route for Mobile Web Application Engine by Lim, A. M. H., Sazli, N. S. W., Hussin, B., Azlianor, A. A., Suhaizan, S. M., Massila, K.

    Published 2009
    “…In this paper, we proposed the used of Dijkstra’s Algorithms to provide more effective and intelligent shortest path system to provide the solution for traveler to reach the desired destination. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19
  20. 20

    Speech coding for Bluetooth with CVSD algorithm by Khalifa, Othman Omran, Khan, Sheroz, Islam, Md. Rafiqul, Muktar, Mohd, Yaacob, Zahrein

    Published 2004
    “…Speech coding is performed using numerous steps or operations specified as an algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper