Search Results - (( using function method algorithm ) OR ( web application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- method algorithm »
- function method »
- web application »
- using function »
-
1
Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan
Published 2020“…The functionality testing is conducted using Blackbox testing technique to test the functionality of the project.…”
Get full text
Get full text
Thesis -
2
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
Get full text
Get full text
Thesis -
3
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…The objective of the project is to design and develop an E-History Malaysian secondary school textbook system using Term Frequency-Inverse Document Frequency (TF-IDF) algorithm with text visualization and also to test the functionality and usability of the system through a web-based system. …”
Get full text
Get full text
Thesis -
4
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
5
Smart Routing For Solid Waste Collection
Published 2023“…The algorithm will be evaluated through simulations and field testing in a residential area in Kuching. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…Additionally, a DNA-based ShiftRow function was proposed to enhance the execution of permutation by methodically displacing the rows of the state array using different offset values. …”
Get full text
Get full text
Thesis -
7
Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques
Published 2024“…The study findings indicate that the suggested Certainty Factor method is more suited for use in embedded systems or web-based applications, however it is constrained by low processing.…”
Get full text
Get full text
Get full text
Article -
8
Intelligent agent for electronic commerce using neural network approach / Yap Hui Sun
Published 2001“…Chapter - Methodology, justifying the method chosen for the system development, project planning that includes project schedule and system modules, procedure of the system, which are the functional and non-functional requirements,hardware and software used to develop the system. …”
Get full text
Get full text
Thesis -
9
An e-voting application using cryptography technology
Published 2020“…In order to improve the security and confidentiality of the system, this system will also use the hashing function to complete. Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
Get full text
Get full text
Thesis -
11
Impact of low-dose protocols on computed tomography of lung cancer screening on the intrinsic performance metrics: a phantom study
Published 2023“…We compared the noise power spectrum (NPS), target transfer function (TTF), and contrast-to-noise ratio (CNR) values for different IR algorithm levels in the low dose group for both acrylic and LDPE inserts. …”
Get full text
Get full text
Conference or Workshop Item -
12
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
13
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Lastly, on the Testing phase two type of data has been used to test this web tool result. …”
Get full text
Get full text
Thesis -
15
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
16
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
Get full text
Get full text
Thesis -
17
Development and integration of capacitive sensing and electrocuting grid for mosquitoes surveillance and control
Published 2020“…The final proposed system is tested with a basic species recognition algorithm and achieved species recognition rate of between 75% to 83% and selective trapping rate of between 63% to 69%.…”
Get full text
Get full text
Get full text
Thesis -
18
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
19
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…This new improved approach is significant in helping web application developers to test their applications for all types of XSS and remove any detected vulnerabilities before releasing them to the public. …”
Get full text
Get full text
Get full text
Thesis -
20
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Web 2.0 is commonly associated with Web applications that facilitate interactive information sharing, interoperability, user-centred design, and collaboration utilizing of technology. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
