Search Results - (( developing web ((issues algorithm) OR (based algorithm)) ) OR ( java implication _ algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A spark-based parallel fuzzy C median algorithm for web log big data by Mallik, Moksud Alam, Zulkurnain, Nurul Fariza, Nizamuddin, Mohammed Khaja, Sarkar, Rashal, Chalil, Aboosalih Kakkat

    Published 2022
    “…This paper proposes an efficient parallel Fuzzy C median solution based on Spark for large-scale web log data. Based on the Rand Index and SSE (sum of squared error), the parallel Fuzzy C median algorithm's performance is evaluated in the PySpark platform. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad by Sulaiman, Muhammad Nur Haqeem, Ahmad, Norhasliza

    Published 2023
    “…The web application offers functionality for students to search and filter scholarships to suit their preferences or needs and the most relevant scholarships are provided based on matching algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…This research aim to solve these issues by developing a detection model for detecting and recognizing the web vulnerabilities based on the defined and identified criteria. …”
    Get full text
    Get full text
    Research Reports
  5. 5

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…Research on website and server security currently have been developing Web Document Integrity Detector (WebDID) to overcome intrusion in website and web server. …”
    Get full text
    Get full text
    Monograph
  7. 7
  8. 8

    Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli by Ramli, Muhammad Hafiz

    Published 2020
    “…In conclusion, based on the ten (10) scenario, the failure error 404 and 500 occur in ICMP based monitoring, which in the network layer while congestion issue in HTTP based monitoring, which is in the application layer. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Using web questionnaire for web-based course evaluation: advantages and disadvantages by Fariborzi, Elham, Abu Bakar, Kamariah, Kasa, Zakaria, Abu Samah, Bahaman, Abdullah, Muhammad Taufik

    Published 2017
    “…It also shows advantages & disadvantages of Web surveys. It can be concluded that Web survey researchers should conduct a careful assessment of their research goals, consider some algorithms and tricks to increase the credibility and response rate through Web questionnaire. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    User recommendation algorithm in social tagging system based on hybrid user trust by Mustapha, Norwati, Wong, Pei Voon, Sulaiman, Md. Nasir

    Published 2013
    “…This method is a combination of developing trust network based on user interest similarity and trust network from social network analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences by Mustafa, Payandenick, Yin Chai, Wang

    Published 2025
    “…Recommendation systems use algorithms to analyze user data and provide personalized recommendations based on their past behaviour and preferences. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Student-Class (SC) optimization system / Haifaa Mahfuzah Hazalin by Hazalin, Haifaa Mahfuzah

    Published 2020
    “…To solve the issue the Student-Class Optimization System had been developed by using optimization technique, specifically, is a Greedy Algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…To address a specific cloud security challenges, an enhanced authentication method is developed during this research work. Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Stock price monitoring system by Ng, Chun Ming

    Published 2024
    “…This project is a development-based project with deep learning approach for academic purpose. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17

    Web page design for electronic commerce / Lee Fong Wai by Lee , Fong Wai

    Published 2003
    “…This part covers the introduction of electronic commerce and online shopping, features of the online shopping software available in the market, data mining technology, programming languages, web development tools, database technology and also security issues. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Student resource exchange: a web-based system for sharing educational resources among students by Saw, Hui Loo

    Published 2025
    “…This project focuses on the development of the Student Resource Exchange, a web-based platform designed to enhance the sharing and accessibility of educational resources among students. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Facial recognition attendance system by Lew, Tian Pei

    Published 2023
    “…A web-based system was developed to let admin and instructor to manage the class and class attendance while the Android-based system was developed to let students to check their attendance.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…In addition, it is able to provide provision which are extended for QoS support. The Dynamic Based Bandwidth Reservation (DBBR) algorithm is designed to ensure that fair bandwidth access for both upstream and downstream nodes are achieved. …”
    Get full text
    Get full text
    Thesis