Search Results - (( development process function algorithm ) OR ( java web detection algorithm ))

Refine Results
  1. 1

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…A Genetic Algorithm forms the core scheduling engine, generating optimized timetables that respect both hard constraints, such as avoiding clashes, and soft constraints, such as personal preferences.The final output of this project is a functional web-based timetable planner that successfully enhances scheduling efficiency, reduces the likelihood of errors, and improves the overall academic planning experience. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…Various cost estimation models and methods are available to be used for software development process. The COCOMO, an algorithmic model is one example. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development Of Generative Computer-Aided Process Planning System For Lathe Machining by Zubair, Ahmad Faiz

    Published 2019
    “…CAPP functions as the recognizer of the geometric input from CAD and analyse it into specific function for manufacturing purpose in CAM. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…This study aims to develop an algorithm for the AOI system to segment and detect surface defects, requiring low processing power and a small number of learning dataset with labelling error resistance. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Computer control of batch process plant (software development) by Safian, Salehudin

    Published 1995
    “…The algorithm has been successful tested using the Non-interacting Liquid Level Control of Three lank System plant models transfer function.…”
    Get full text
    Get full text
    Student Project
  13. 13

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. There are three functions for each encryption process which are substitution function, crossover and mutation function and add round key function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Computing the autopilot control algorithm using predictive functional control for unstable model by H. A., Kasdirin, J. A., Rossiter

    Published 2009
    “…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Hybrid artificial immune system-genetic algorithm optimization based on mathematical test functions by Ali M.O., Koh S.P., Chong K.H., Yap D.F.W.

    Published 2023
    “…The hybrid includes two processes; firstly, AIS is the attraction among the researchers as the algorithm. …”
    Conference paper
  16. 16

    Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column by Maan, Normah

    Published 2005
    “…A series of algorithms in solving the inverse problem were then developed corresponding to the forward models. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…Among the latest Evaluation Algorithm (EA) have been developed is Differential Evolution (DE). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Some metaheuristic algorithms for solving multiple cross-functional team selection problems by Ngo, S.T., Jaafar, J., Izzatdin, A.A., Tong, G.T., Bui, A.N.

    Published 2022
    “…The developed method also demonstrated the effectiveness of the multi-criteria decision-making process when compared with the multi-objective evolutionary algorithm (MOEA). …”
    Get full text
    Get full text
    Article
  20. 20

    A video-rate color image segmentation using adaptive and statistical membership function by Sojodishijani, Omid, Rostami, Vahid, Ramli, Abdul Rahman

    Published 2010
    “…Typically, the image segmentation algorithms in video processing system require very high computation power, so it is desirable to develop algorithms for implementation as a real-time system. …”
    Get full text
    Get full text
    Get full text
    Article