Search Results - (( developing cost function algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- function algorithm »
- developing cost »
- cost function »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
A genetic algorithm based approach for economic dispatch in power system / Mohd Rozely Kalil
Published 1998“…The Genetic Algorithm developed in the project was tested on two objective functions for optimizing the economic dispatch problem, which are the total generation cost and the incremental cost function. …”
Get full text
Get full text
Thesis -
10
Economic power dispatch solution with non-smooth cost functions using differential evolution: article / Muhammad Firdaus Abd Rahim
Published 2011“…The results obtained show that DE can solve Economic Dispatch with non-smooth cost function successfully. The program for this algorithm has been developed in Matlab 7.6 platform.…”
Get full text
Get full text
Article -
11
Economic power dispatch solution with non-smooth cost functions using differential evolution / Muhammad Firdaus Abd Rahim
Published 2011“…The results obtained show that DE can solve Economic Dispatch with non-smooth cost function successfully. The program for this algorithm has been developed in Matlab 7.6 platform.…”
Get full text
Get full text
Thesis -
12
Economic dispatch with piecewise linear function and line loss / Amir Ashraf Mohd Johari
Published 2014“…A generalized computer algorithm is developed which uses an iterative solution of lineaized cost function to find the economic dispatch of the power system generation. …”
Get full text
Get full text
Thesis -
13
New development of analysis tool for optimizing generation cost with gas emission via an electromagnetism like algorithm
Published 2023“…This paper addresses the preliminary new development results of the evolutionary algorithm technique to optimize the formulated problems incorporating the generation cost with emission gas as objective function or constraints. …”
Article -
14
Effort Estimation Model for Function Point Measurement
Published 2007“…This research work has generated an algorithmic effort estimation model for function points measurement. …”
Get full text
Get full text
Thesis -
15
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…However, the performance of most of these algorithms tend to decline in terms of function and computational cost when dealing with robust systems. …”
Get full text
Get full text
Thesis -
16
Congestion management based optimization technique using bee colony
Published 2023“…The study involved the development of bee colony algorithm in addressing congestion management, considering cost optimization as the objective function. …”
Conference Paper -
17
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…To validate the generated tool-path, G-codes generated in media package file (MPF) file format and verified through CNC lathe machine. Indeed, the developed algorithm was able to determine the minimum unit production cost of lathe machining part model. …”
Get full text
Get full text
Thesis -
18
Optimisation of multi-stage production-inspection stations using genetic algorithm
Published 2000“…The main goal of this work is to develop an efficient optimisation tool which will minimise the cost functions of the stated optimisation problems. …”
Get full text
Get full text
Article -
19
Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan
Published 2020“…The functionality testing is conducted using Blackbox testing technique to test the functionality of the project.…”
Get full text
Get full text
Thesis -
20
Optimization Of Fuzzy Logic Controllers With Genetic Algorithm For Two-Part-Type And Re-Entrant Production Systems
Published 2008“…The objective function of the GSF controller is to minimize the overall production cost based on work-in-process (WIP) and backlog cost, while surplus minimization is considered in GDF controller. …”
Get full text
Get full text
Thesis
