Search Results - (( developing demand function algorithm ) OR ( java web detection algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Hybrid optimization approach to estimate random demand by Wahab, Musa, Ku-Mahamud, Ku Ruhana, Yasin, Azman

    Published 2012
    “…The main objective of this study is to develop a demand forecasting model that should reflect the characteristics of random demand patterns.To accomplish this goal, a hybrid algorithm combining a genetic algorithm and a local search algorithm method was developed to overcome premature convergence in local optima problems.The performance of the hybrid algorithm was compared with a single algorithm model in estimating parameter values that minimize objective function which was used to measure the goodness-of-fit between the observed data and simulated results.However, two problems had to be overcome in the forecasting random demand model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Long term energy demand forecasting based on hybrid, optimization: Comparative study by Musa, Wahab, Ku-Mahamud, Ku Ruhana, Yasin, Azman

    Published 2012
    “…The objective of this research is to develop a long term energy demand forecasting model that used hybrid optimization.To accomplish this goal, a hybrid algorithm that combined a genetic algorithm and a local search algorithm method has been developed to overcome premature convergence.Model performances of hybrid algorithm were compared with former single algorithm model in estimating parameter values of an objective function to measure the goodness-of-fit between the observed data and simulated results.Averages error between two models was adopt to select the proper model for future projection of energy demand.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems by Ariafar, Shahram

    Published 2012
    “…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A genetic algorithm based approach for economic dispatch in power system / Mohd Rozely Kalil by Kalil, Mohd Rozely

    Published 1998
    “…The Genetic Algorithm developed in the project was tested on two objective functions for optimizing the economic dispatch problem, which are the total generation cost and the incremental cost function. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Optimal demand response of solar energy generation using Genetic Algorithm / Muhammad Asyraaf Adlan by Adlan, Muhammad Asyraaf

    Published 2025
    “…The aim of this study is to optimize the demand response of solar energy generation using Genetic Algorithm (GA) to minimize the daily yield loss caused by load shedding. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Irrigation Management Based on Reservoir Operation with an Improved Weed Algorithm by Ehteram, Mohammad, P. Singh, Vijay, Karami, Hojat, Hosseini, Khosrow, Dianatikhah, Mojgan, Hossain, Md., Ming Fai, Chow, El-Shafie, Ahmed

    Published 2018
    “…The Aswan High Dam, one of the most important dams in Egypt, was selected for this study to supply irrigation demands. The improved weed algorithm (IWA) had developed local search ability so that the exploration ability for the IWA increased and it could escape from local optima. …”
    Get full text
    Get full text
    Article
  15. 15

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16

    Economic power dispatch solution with non-smooth cost functions using differential evolution: article / Muhammad Firdaus Abd Rahim by Abd Rahim, Muhammad Firdaus

    Published 2011
    “…The results obtained show that DE can solve Economic Dispatch with non-smooth cost function successfully. The program for this algorithm has been developed in Matlab 7.6 platform.…”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Economic power dispatch solution with non-smooth cost functions using differential evolution / Muhammad Firdaus Abd Rahim by Abd Rahim, Muhammad Firdaus

    Published 2011
    “…The results obtained show that DE can solve Economic Dispatch with non-smooth cost function successfully. The program for this algorithm has been developed in Matlab 7.6 platform.…”
    Get full text
    Get full text
    Thesis
  19. 19

    A comparative study of clonal selection algorithm for effluent removal forecasting in septic sludge treatment plant by Ting, Sie Chun, Abdul Malik, Marlinda, Ismail, Amelia Ritahani

    Published 2015
    “…In order to investigate the expected functionality of the required standard, the prediction of the effluent quality, namely biological oxygen demand, chemical oxygen demand and total suspended solid of an SSTP was modelled using an artificial intelligence approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Development Of Generative Computer-Aided Process Planning System For Lathe Machining by Zubair, Ahmad Faiz

    Published 2019
    “…These functions always create irregular data descriptions in current CAD and CAM system supply and demand. …”
    Get full text
    Get full text
    Thesis