Search Results - (( development program control algorithm ) OR ( java attack detection algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
    Get full text
    Get full text
    Monograph
  10. 10
  11. 11

    Controller And Circuitry Design And Implementation For Fire Fighting Robot For MIROC 2014 Competition by Reyfill Konnik, Charlie Ivan

    Published 2014
    “…The motor control algorithm is developed by using DC motor control theory, which involves determining the motor's mechanical and electrical parameters.Upon the completion of mechanical fabrication, circuit design and parameter extraction, the process of developing the navigation algorithm begins. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    CAR TRACTION CONTROL SYSTEM by MOHD ISMAIL, ADIBAH

    Published 2007
    “…The methodology includes designing the fuzzy logic controller, development of the algorithm and codes programming. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Real-time implementation of H∞ controller for UAV helicopter using MATLAB-based embedded programming approach by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari

    Published 2015
    “…The rapid-prototyping and deployment of flight control algorithm on a real-time embedded target has been one of the major challenges in an unmanned helicopter system development. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Modelling and optimisation of blood glucose control for type 1 diabetes using multi-parametric programming and model-based predictive control (mp-MPC) / Associate Professor Dr Ayub... by Md. Som, Ayub

    Published 2014
    “…In doing so, Multi-Parametric Programming technique is used to develop the computer algorithm; whereas Model-Based Predictive Control (MPC) is adopted for the design of the controller. …”
    Get full text
    Get full text
    Monograph
  15. 15

    DC motor control using LQR algorithm by Adezeno, Sagoli Olid

    Published 2008
    “…The LQR controller will act as a benchmark for the algorithm performance of the overall control system.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Diagnosis of Poor Control Loop Performance: Development of a Model Based Compensation Algorithm for Control Valve Stiction Nonlinearity by N. Narayanasamy, Anand

    Published 2016
    “…The objective of this paper is to develop a model based compensation algorithm using optimization approach of MIQP based MPC backlash compensator for control valve stiction nonlinearity. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Development of adaptive perturb and observe-fuzzy control maximum power point tracking for photovoltaic boost dc-dc converter by Mohd Zainuri, Muhammad Ammirrul Atiqi, Mohd Radzi, Mohd Amran, Che Soh, Azura, Abd Rahim, Nasrudin

    Published 2014
    “…For evaluation and comparison analysis, conventional P&O and fuzzy logic control algorithms have been developed too. All the algorithms were simulated in MATLAB-Simulink, respectively, together with PV module of Kyocera KD210GH-2PU connected to PV boost dc-dc converter. …”
    Get full text
    Get full text
    Article
  19. 19

    Development of robust control scheme for wheeled mobile robot in restricted environment by Muhammad Sawal, A Radzak

    Published 2021
    “…A simulation study of WMR control in pre-planned paths in two environments namely, zigzag and highly curved terrains, has been conducted to verify the proposed algorithm and compare it with other existed algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20