Search Results - (( development projects function algorithm ) OR ( java security detection algorithm ))

Refine Results
  1. 1

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The project scope encompasses features such as secure login, course selection with conflict detection, timetable history, comparison between auto-generated and manual schedules, collaboration modules, and export functionality. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…Results show that there is an approximately linear relationship between the project’s functionality and final effort that is required in the development. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A genetic algorithm based approach for economic dispatch in power system / Mohd Rozely Kalil by Kalil, Mohd Rozely

    Published 1998
    “…The Genetic Algorithm developed in the project was tested on two objective functions for optimizing the economic dispatch problem, which are the total generation cost and the incremental cost function. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
    Get full text
    Get full text
    Article
  16. 16

    Smart and energy aware routing for the internet of mobile things by Beh, Zi Xuan

    Published 2021
    “…This project is to design a smart and energy aware routing algorithm for the Internet of Mobile Things. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Exam hall allocation using genetic algorithm / Norisyani Binti Fauzai by Fauzai, Norisyani

    Published 2021
    “…In this project an automated exam hall allocation prototype was developed using the genetic algorithm since this algorithm is commonly used to produce high-quality optimization solutions. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Application of adaptive bats sonar algorithm to minimise car side impact design by Tan, Hon Seong

    Published 2017
    “…This project was focusing on the modification of bats sonar algorithm (BSA) and renamed to adaptive bats sonar algorithm (ABSA) due to some limitations of previous algorithm. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Gps solution for active queue management using android platform by Liu, Yu Yao

    Published 2021
    “…Tools used to develop the project is Android Studio with Google Firebase as database of this project. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Application of minimax algorithm in dots and boxes game by Tan, Ah Hwa

    Published 2025
    “…The research process included designing and developing a functional Dots and Boxes game prototype using C# and the Universal Windows Platform (UWP), featuring a user-friendly interface and customizable settings. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis