Search Results - (( developing storage optimization algorithm ) OR ( java attack detection algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Pumped-storage scheduling using particle swarm optimization / Amirul Asraf Razali by Razali, Amirul Asraf

    Published 2012
    “…This is because particle swarm optimization (PSO) algorithm is developed to give the economical cost for the hydrothermal generation with pumped-storage unit to fulfill the constraint of thermal and hydro unit. …”
    Get full text
    Get full text
    Thesis
  6. 6

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Development of multi-objective optimization methods for integrated scheduling of handling equipment (AGVs, QCs, SP-AS/RS) in automated container terminals by Homayouni, Seyed Mahdi

    Published 2012
    “…Therefore, two meta-heuristic algorithms, namely genetic algorithm (GA) and simulated annealing (SA) algorithm, were developed to optimize the integrated scheduling of handling equipment. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism by Alomari M.F., Mahmoud M.A., Gharaei N., Rasool S.M., Hasan R.A.

    Published 2025
    “…The major contribution of this work lies in the develop of Prior Evaluation Cloud Storage Cost Optimization called (PECSCO) mechanism to optimize the cloud cost with least overhead. …”
    Conference paper
  13. 13
  14. 14
  15. 15

    Analysis and modeling of database storage optimization power consumption usage for green data centers by Wan Noor Hamiza, Wan Ali

    Published 2014
    “…This technique requires proxy candidate in order to drop some attribute for decrease the space storage. The proxies can be discovered by using a developed algorithm of functional dependencies (FDs) called as TANE algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Design and optimization of a compressed air energy storage (CAES) power plant by implementing genetic algorithm by Shamshirgaran, S. Reza, Ameri, M, Khalajiassadi, Morteza, Ahmadi, M. Hossein

    Published 2016
    “…The strong penalties of CO2 generation have forced the designers to develop systems having the least pollution. Almost two thirds of electrical output energy of a conventional gas turbine (GT) is consumed by its compressor section, which is the main motivation for the development of Compressed Air Energy Storage (CAES) power plants. …”
    Get full text
    Get full text
    Article
  18. 18

    Multi-Objective Optimal Energy Management of Nanogrid Using Improved Pelican Optimization Algorithm by Jamal S., Pasupuleti J., Rahmat N.A., Tan N.M.L.

    Published 2025
    “…This strategy, which is based on the improved pelican optimization algorithm (IPOA), involves the development of a multi-objective optimization (MOA) equation with several constraints, while taking into account the Malaysian grid purchasing and selling prices. …”
    Article
  19. 19
  20. 20

    Switching Time Optimization via Time Optimal Control for Natural Gas Vehicle Refueling by Mahidzal Dahari, Mahidzal

    Published 2007
    “…The implementation of Natural Gas Vehicle (NGV) refueling system using multipressure storage source requires a suitable controller to be developed. …”
    Get full text
    Get full text
    Thesis