Search Results - (( site detection method algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- method algorithm »
- java application »
- site detection »
-
1
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
Get full text
Get full text
Thesis -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
Web application vulnerabilities detection model
Published 2016“…The evaluation of the proposed method is via detection accuracy of each web vulnerability.…”
Get full text
Get full text
Research Reports -
6
Wind direction and speed estimation for quadrotor based gas tracking robot
Published 2017“…In gas extraction sites, the incidents of gas leaking poses a damage to workers on site. …”
Get full text
Book Section -
7
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…The overall accuracy of the Support Vector Machine SVM and Random Forest RF classifiers revealed that three of the six algorithms exhibited higher ranks in the landslide detection. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
Published 2024“…Artificial Neural Network (ANN) is one popular method for website phishing detection. ANN is capable of detecting phishing websites by identifying patterns and characteristics connected to phishing websites through a network training phase. …”
Get full text
Get full text
Get full text
Article -
11
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
12
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
13
-
14
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…This paper presents a fault diagnosis method for twisted pair cable fault detection based on knowledge-based and data-driven machine learning methods. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Real-Time Detection of Personal Protective Equipment for Site Safety Using Deep Learning Techniques
Published 2022Get full text
Get full text
Undergraduates Project Papers -
17
Cheating Detection in Examinations Using Improved YOLOv8 with Attention Mechanism
Published 2024“…To improve the speed of video detection, a student's abnormal-behavior detection method was proposed based on improved YOLOv8 and attention mechanism to achieve real-time detection of cheating actions in an exam room on a regular performance computer. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
19
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
20
An object-based approach to detect tree stumps in a selective logging area using Unmanned Aerial Vehicle imagery
Published 2021“…Feature extraction and segmentation images to extract stumps from a UAV scene of a forested area in Ulu Jelai, Pahang provides a quick, automated method for identifying stumps. This research implemented a technique for detecting, segmenting, classifying, and measuring tree stumps by using the Multiresolution Segmentation Algorithm method. …”
Get full text
Get full text
Get full text
Article
