Search Results - (( code application testing algorithm ) OR ( java applications cloud algorithm ))

Refine Results
  1. 1

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…This application handle execution of anonymous code that could be malicious securely by running the code in an isolate environment. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    WAVELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS by Chai, Beng Seow

    Published 2007
    “…This project is about the implementation ofWavelet-DCT intra-frame coder for video coding applications. Wavelet-DCT is a novel algorithm that uses Forward Discrete Wavelet Transform (DWT) to compute DCT. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…It has been applied in many practical applications. For most of the cases of the shortest route finding, the Dijkstra's algorithm is known to be an optimal search algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    WA VELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS by GANI, REGINA

    Published 2008
    “…The algorithm allows truncation of intermediate coefficient through DWT. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions by Goh, Kwang Yi, Baharom, Salmi, Din, Jamilah

    Published 2022
    “…We propose a tool, namely the Crash Droid, that allows the automation of testing context-aware Android applications. We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…This new improved approach is significant in helping web application developers to test their applications for all types of XSS and remove any detected vulnerabilities before releasing them to the public. …”
    Get full text
    Get full text
    Get full text
    Thesis