Search Results - (( development loading optimization algorithm ) OR ( java attack detection algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of bacteria foraging optimization algorithm for cell formation in cellular manufacturing system considering cell load variations by Nouri, Hossein, Tang, Sai Hong

    Published 2013
    “…In addition, for this purpose matrix-based bacteria foraging optimization algorithm traced constraints handling (MBATCH) is developed. …”
    Get full text
    Get full text
    Article
  8. 8

    Optimal under voltage load shedding based on stability index by using artificial neural network by Sharman, Sundarajoo

    Published 2020
    “…Nevertheless, to obtain the lowest amount to be shed in order to avoid voltage instability, optimization is required. An algorithm was developed to shed the optimal load by considering the load priority whereby the load with least priority will be shed first. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Optimal vehicle to grid planning and scheduling using double layer multi-objective algorithm by Tan K.M., Ramachandaramurthy V.K., Yong J.Y.

    Published 2023
    “…Algorithms; Charging (batteries); Curve fitting; Electric load flow; Electric power systems; Electric vehicles; Energy management systems; Optimization; Reactive power; Real time control; Scheduling; Vehicles; Voltage control; Voltage regulators; Battery chargers; Bidirectional power flow; Multi objective algorithm; Optimization algorithms; Reactive power compensation; Real-time implementations; Revolutionary technology; Vehicle to grids; Electric power transmission networks; algorithm; electric vehicle; electricity supply; energy flow; energy planning; energy use; optimization; technological development…”
    Article
  11. 11
  12. 12

    Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat by Minhat, Abdul Rahman

    Published 2008
    “…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices by Ali Abdallah, Ali Emhemed

    Published 2021
    “…To solve this problem, an optimal load shedding approach, integrated with optimal DG sizing is proposed using the ABC-HC algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimization of neural network architecture using genetic algorithm for load forecasting by Islam, B.U., Baharudin, Z., Raza, M.Q., Nallagownden, P.

    Published 2014
    “…In this paper, a computational intelligent technique genetic algorithm (GA) is implemented for the optimization of artificial neural network (ANN) architecture. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    An evaluation of network load balancing through Ant Colony Optimization (ACO) based technique / Muhammad Nur Zikri Mohamad Hafizan by Mohamad Hafizan, Muhammad Nur Zikri

    Published 2020
    “…This project works on developing an efficient network load balancing mechanism based on the Ant Colony Optimization (ACO) algorithm. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…This research proposes an enhancement of the ant colony optimization algorithm that caters for dynamic scheduling and load balancing in the grid computing system. …”
    Get full text
    Get full text
    Get full text
    Monograph
  17. 17

    Optimal charging strategy for plug-in hybrid electric vehicle using evolutionary algorithm by Lee, Clement Yuon Sien

    Published 2016
    “…The results showed that the developed charging strategy achieved the required battery capacity and has reduced peak load and improved load factor thus reduces impacts on power system networks.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Resource scheduling algorithm with load balancing for cloud service provisioning by Priya, V., Sathiya Kumar, C., Kannan, R.

    Published 2019
    “…Increasing utilization of Virtual Machines through effective and fair load balancing is then achieved by dynamically selecting a request from a class using Multidimensional Queuing Load Optimization algorithm. …”
    Get full text
    Get full text
    Article
  20. 20

    An Optimized Binary Scheduling Controller for Microgrid Energy Management Considering Real Load Conditions by Mannan M., Roslan M.F., Reza M.S., Mansor M., Jern K.P., Hossain M.J., Hannan M.A.

    Published 2024
    “…This study presents an optimal schedule controller for microgrid energy management, utilizing the Binary Particle Swarm algorithm (BPSO) to minimize costs and ensure optimal power delivery to loads. …”
    Conference Paper