Search Results - (( developing _ function algorithm ) OR ( java web detection algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…This complexity can be done by designing an algorithm that consists of substitution function and permutation function which provides confusion and diffusion properties. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Computing the autopilot control algorithm using predictive functional control for unstable model by H. A., Kasdirin, J. A., Rossiter

    Published 2009
    “…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah by Ali, Sadollah

    Published 2013
    “…In addition, two novel optimization methods are developed and presented which are named the mine blast algorithm (MBA) and the water cycle algorithm (WCA). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…This research work has generated an algorithmic effort estimation model for function points measurement. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…In this thesis also, I developed a new technique to extract the logic programming from radial basis function neural networks. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A video-rate color image segmentation using adaptive and statistical membership function by Sojodishijani, Omid, Rostami, Vahid, Ramli, Abdul Rahman

    Published 2010
    “…Typically, the image segmentation algorithms in video processing system require very high computation power, so it is desirable to develop algorithms for implementation as a real-time system. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy by Qing, Zhang, Abdullah, Abdul Rashid, Choo, Wei Chong, Ali, Mass Hareeza

    Published 2022
    “…These basic indicators can comprehensively and effectively reflect a country’s or region’s future economic development. The center of radial basis function neural network and smoothing factor to take a uniform distribution of the random radial basis function artificial neural network will be the focus of this study. …”
    Get full text
    Get full text
    Article
  20. 20

    Development Of Artificial Bee Colony (Abc) Variants And Memetic Optimization Algorithms by Sulaiman, Noorazliza

    Published 2017
    “…The performances of all modified ABC variants and formulated memetic ABC algorithms have been evaluated on 27 benchmark functions. …”
    Get full text
    Get full text
    Thesis