Search Results - (( developing ((web method) OR (new method)) algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- web method »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The prototype has been developed using PHP, JavaScript enveloped in a Bootstrap web creator. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
4
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
7
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…While numerous approaches for early detection continue to evolve, the quest for innovative methods remains constant. In light of this, our research project aimed to develop and evaluate a highly efficient desktop application meticulously designed for a SARS-CoV-2 testing device based on electrochemical potentiostat principles. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
9
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
10
Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi
Published 2017“…Therefore, agile development methodology is very useful method to make the system successful and can be developed according to the schedule. …”
Get full text
Get full text
Thesis -
11
Use of web page credibility information in increasing the accuracy of web-based question answering systems / Asad Ali Shah
Published 2017“…This research attempts to improve accuracy in Web-based QA systems by developing a prototype Web-based QA system, named Optimal Methods QA (OMQA) system, which uses methods producing highest accuracy of answers, and improving the same by adding a credibility assessment module, called Credibility-based OMQA (CredOMQA) system. …”
Get full text
Get full text
Get full text
Thesis -
12
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Direct approach for mining association rules from structured XML data
Published 2012“…Efforts are made to develop a new tool or method for extracting information from XML data directly without any preprocessing or post processing of the XML documents. …”
Get full text
Get full text
Thesis -
15
The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi
Published 2017“…Technological development also affects the detection field. Today many methods invented by experts in technology to facilitate the public to make any finding on whether static or dynamic detection. …”
Get full text
Get full text
Thesis -
16
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
A Review of Multi-criteria Decision-Making Methods Using Application of Variable Weight Theory and IF-TOPSIS-EF
Published 2021“…Furthermore, there is a need to develop new methods that utilizing the web or mobile technologies to deal with complexity and uncertainty adhered to multi-criteria decision-making problems. …”
Get full text
Get full text
Get full text
Book Chapter -
18
User recommendation algorithm in social tagging system based on hybrid user trust
Published 2013“…This method is a combination of developing trust network based on user interest similarity and trust network from social network analysis. …”
Get full text
Get full text
Get full text
Article -
19
Geometric feature descriptor and dissimilarity-based registration of remotely sensed imagery
Published 2024“…Moreover, an invariant feature correspondence method is proposed as a point matching algorithm, which incorporates new descriptor's dissimilarity metric. …”
Article -
20
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal
