Search Results - (( developing web issues algorithm ) OR ( java optimization path algorithm ))
Search alternatives:
- java optimization »
- optimization path »
- issues algorithm »
- developing web »
- path algorithm »
- web issues »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
2
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
3
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Web application vulnerabilities detection model
Published 2016“…This research aim to solve these issues by developing a detection model for detecting and recognizing the web vulnerabilities based on the defined and identified criteria. …”
Get full text
Get full text
Research Reports -
6
ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad
Published 2023“…The development of this web application has the potential to revolutionize the way students search and apply for scholarships. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System
Published 2017“…Text mining is considered the most related field to database management and web search queries. The relation to the database query, it needs suitable query algorithm web search and user profiling strategy. …”
Get full text
Get full text
Get full text
Article -
9
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Research on website and server security currently have been developing Web Document Integrity Detector (WebDID) to overcome intrusion in website and web server. …”
Get full text
Get full text
Monograph -
10
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
11
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…Furthermore, this research will evaluate the number of success rate for the user that successfully load the web page. Besides, notification of the HTTP-response status will be developed for the web server. …”
Get full text
Get full text
Thesis -
12
Using web questionnaire for web-based course evaluation: advantages and disadvantages
Published 2017“…In addition, before choosing a specific Web questionnaire or developing one, the timeline for data collection through Web survey, and the financial situation should be considered.…”
Get full text
Get full text
Conference or Workshop Item -
13
Student-Class (SC) optimization system / Haifaa Mahfuzah Hazalin
Published 2020“…To solve the issue the Student-Class Optimization System had been developed by using optimization technique, specifically, is a Greedy Algorithm. …”
Get full text
Get full text
Thesis -
14
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
15
-
16
Web page design for electronic commerce / Lee Fong Wai
Published 2003“…This part covers the introduction of electronic commerce and online shopping, features of the online shopping software available in the market, data mining technology, programming languages, web development tools, database technology and also security issues. …”
Get full text
Get full text
Thesis -
17
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
18
-
19
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
20
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Therefore, it is essential to develop a new technique to authenticate access to database related to web applications and prevent SQL injection vulnerabilities. …”
Get full text
Get full text
Get full text
Article
