Search Results - (( developing quality function algorithm ) OR ( java web detection algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    Some metaheuristic algorithms for solving multiple cross-functional team selection problems by Ngo, S.T., Jaafar, J., Izzatdin, A.A., Tong, G.T., Bui, A.N.

    Published 2022
    “…We compared the developed algorithms with the MIQP-CPLEX solver on 500 programming contestants with 37 skills and several randomized distribution datasets. …”
    Get full text
    Get full text
    Article
  10. 10

    Curve Reconstruction By Metaheuristics Algorithms On Cubic Rational Bézier Function by Mohamed, Najihah

    Published 2019
    “…The optimisation technique consists of exact algorithm, and approximate algorithm. The approximate algorithm is a good technique to be highlighted since it is a feasible way to develop an easier, more convenient curve fitting method, that will save great computation, solve a large scale problem and produce a better quality end result. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Hybrid of firefly algorithm and pattern search for solving optimization problems by Wahid, Fazli, Ghazali, Rozaida

    Published 2018
    “…The proposed technique has been named as FA-PS in which PS has been used to introduce enhancement in the solution quality of standard FA. The developed approach has been applied to various types of maximization and minimization functions and the performance has been compared with standard FA and genetic algorithm in terms of getting the most optimal values for the functions being considered. …”
    Get full text
    Get full text
    Article
  12. 12

    Agarwood oil quality classification using one versus all strategies in multiclass on SVM model / Aqib Fawwaz Mohd Amidon … [et al.] by Mohd Amidon, Aqib Fawwaz, Mahabob, Noratikah Zawani, Ismail, Nurlaila, Mohd Yusoff, Zakiah, Taib, Mohd Nasir

    Published 2021
    “…By continuing developing this standard, specific algorithm function has been used to make sure the ability of this model is totally not in doubt. …”
    Get full text
    Get full text
    Get full text
    Book Section
  13. 13

    Exam hall allocation using genetic algorithm / Norisyani Binti Fauzai by Fauzai, Norisyani

    Published 2021
    “…In this project an automated exam hall allocation prototype was developed using the genetic algorithm since this algorithm is commonly used to produce high-quality optimization solutions. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Monthly chlorophyll-a prediction using neuro-genetic algorithm for water quality management in Lakes by Lee, G., Bae, J., Lee, S., Jang, M., Park, H.

    Published 2016
    “…A genetic algorithm (GA) was combined with artificial neural networks (ANN), designated as neuro-genetic algorithm (NGA) in this study, to determine the effective number of nodes and optimal activated functions (FAs) in an ANN structure. …”
    Get full text
    Get full text
    Article
  15. 15

    Enhance foreign body image using partitioned iterated function system (PIFS) in image enhancement technique / Hidayah Sharif by Sharif, Hidayah

    Published 2010
    “…This prototype was developed to enhance foreign body images using Partitioned Iterated Function System (PIFS). …”
    Get full text
    Get full text
    Thesis
  16. 16

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…Surface defect segmentation algorithms in Automatic Optical Inspection (AOI) system for modern manufacturing industries provide solutions to quality control with speed, volume and traceability. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of kano model and quality function development integration to assess customer satisfaction and dissatisfaction of service at local public hospital. by Norshahrizan Nordin

    Published 2015
    “…A new Kano-Q and Kano-SS algorithm for quality attribute assessment is developed based satisfaction impact theories and found instrumentally fit the reliability and validity test. …”
    Get full text
    Get full text
    UMK Etheses
  18. 18
  19. 19
  20. 20

    Document ranking using information quality criteria in weblog search engine by Azimzadeh, Fatemeh

    Published 2013
    “…This thesis proposes two ranking functions in the search engine which are combined with the information quality criteria, and then compared with a PageRank based ranking function. …”
    Get full text
    Get full text
    Thesis