Search Results - (( using function method algorithm ) OR ( web application testing algorithm ))

Refine Results
  1. 1

    Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan by Abdul Motok@Mohd Ridzuan, Hafeezur Syakir

    Published 2020
    “…The functionality testing is conducted using Blackbox testing technique to test the functionality of the project.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan by Aznan, Muhammad Nur Syazwanie Aznan

    Published 2019
    “…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…The objective of the project is to design and develop an E-History Malaysian secondary school textbook system using Term Frequency-Inverse Document Frequency (TF-IDF) algorithm with text visualization and also to test the functionality and usability of the system through a web-based system. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Smart Routing For Solid Waste Collection by Ngiam, John Tze

    Published 2023
    “…The algorithm will be evaluated through simulations and field testing in a residential area in Kuching. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…Additionally, a DNA-based ShiftRow function was proposed to enhance the execution of permutation by methodically displacing the rows of the state array using different offset values. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques by Tri Ginanjar Laksana, Ade Rahmat Iskandar, Wan Nooraishya Wan Ahmad

    Published 2024
    “…The study findings indicate that the suggested Certainty Factor method is more suited for use in embedded systems or web-based applications, however it is constrained by low processing.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Intelligent agent for electronic commerce using neural network approach / Yap Hui Sun by Yap, Hui Sun

    Published 2001
    “…Chapter - Methodology, justifying the method chosen for the system development, project planning that includes project schedule and system modules, procedure of the system, which are the functional and non-functional requirements,hardware and software used to develop the system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An e-voting application using cryptography technology by Chin, Hsin Tien

    Published 2020
    “…In order to improve the security and confidentiality of the system, this system will also use the hashing function to complete. Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Impact of low-dose protocols on computed tomography of lung cancer screening on the intrinsic performance metrics: a phantom study by Karim, M.K.A., Khalidi, M. E., Chew, M. T., Kechik, M. M. A., Mazlan, D., Ng, K. H.

    Published 2023
    “…We compared the noise power spectrum (NPS), target transfer function (TTF), and contrast-to-noise ratio (CNR) values for different IR algorithm levels in the low dose group for both acrylic and LDPE inserts. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Lastly, on the Testing phase two type of data has been used to test this web tool result. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan by Wan Chik, Wan Adnan

    Published 2006
    “…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development and integration of capacitive sensing and electrocuting grid for mosquitoes surveillance and control by Khoo, Brendan Teng Thiam

    Published 2020
    “…The final proposed system is tested with a basic species recognition algorithm and achieved species recognition rate of between 75% to 83% and selective trapping rate of between 63% to 69%.…”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Article
  19. 19

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…This new improved approach is significant in helping web application developers to test their applications for all types of XSS and remove any detected vulnerabilities before releasing them to the public. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study by Mohd Nurhafeezi, Nordin

    Published 2013
    “…Web 2.0 is commonly associated with Web applications that facilitate interactive information sharing, interoperability, user-centred design, and collaboration utilizing of technology. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD