Search Results - (( development program control algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- development program »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
Get full text
Get full text
Monograph -
10
-
11
Controller And Circuitry Design And Implementation For Fire Fighting Robot For MIROC 2014 Competition
Published 2014“…The motor control algorithm is developed by using DC motor control theory, which involves determining the motor's mechanical and electrical parameters.Upon the completion of mechanical fabrication, circuit design and parameter extraction, the process of developing the navigation algorithm begins. …”
Get full text
Get full text
Final Year Project -
12
CAR TRACTION CONTROL SYSTEM
Published 2007“…The methodology includes designing the fuzzy logic controller, development of the algorithm and codes programming. …”
Get full text
Get full text
Final Year Project -
13
Real-time implementation of H∞ controller for UAV helicopter using MATLAB-based embedded programming approach
Published 2015“…The rapid-prototyping and deployment of flight control algorithm on a real-time embedded target has been one of the major challenges in an unmanned helicopter system development. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Modelling and optimisation of blood glucose control for type 1 diabetes using multi-parametric programming and model-based predictive control (mp-MPC) / Associate Professor Dr Ayub...
Published 2014“…In doing so, Multi-Parametric Programming technique is used to develop the computer algorithm; whereas Model-Based Predictive Control (MPC) is adopted for the design of the controller. …”
Get full text
Get full text
Monograph -
15
DC motor control using LQR algorithm
Published 2008“…The LQR controller will act as a benchmark for the algorithm performance of the overall control system.…”
Get full text
Get full text
Undergraduates Project Papers -
16
Diagnosis of Poor Control Loop Performance: Development of a Model Based Compensation Algorithm for Control Valve Stiction Nonlinearity
Published 2016“…The objective of this paper is to develop a model based compensation algorithm using optimization approach of MIQP based MPC backlash compensator for control valve stiction nonlinearity. …”
Get full text
Get full text
Final Year Project -
17
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Development of adaptive perturb and observe-fuzzy control maximum power point tracking for photovoltaic boost dc-dc converter
Published 2014“…For evaluation and comparison analysis, conventional P&O and fuzzy logic control algorithms have been developed too. All the algorithms were simulated in MATLAB-Simulink, respectively, together with PV module of Kyocera KD210GH-2PU connected to PV boost dc-dc converter. …”
Get full text
Get full text
Article -
19
Development of robust control scheme for wheeled mobile robot in restricted environment
Published 2021“…A simulation study of WMR control in pre-planned paths in two environments namely, zigzag and highly curved terrains, has been conducted to verify the proposed algorithm and compare it with other existed algorithms. …”
Get full text
Get full text
Thesis -
20
DC-link capacitor voltage control for single-phase shunt active power filter with step size error cancellation in self-charging algorithm
Published 2016“…The other two conventional self-charging algorithms were also programmed for comparison purposes. …”
Get full text
Get full text
Get full text
Article
