Search Results - (( java coded genetic algorithm ) OR ( basic computing machine algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Hybrid genetic algorithm for improving fault localization by Mahamad Zakaria, Muhammad Luqman, Sharif, Khaironi Yatim, Abd Ghani, Abdul Azim, Koh, Tieng Wei, Zulzalil, Hazura

    Published 2018
    “…Therefore, there is a need for a technique which able to localize a fault effectively with less number of mutants generated. Genetic algorithm (GA) is well known in finding an optimal solution to a problem while local search is capable of removing duplication. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Comparative study on job scheduling using priority rule and machine learning by Murad, Saydul Akbar, Zafril Rizal, M Azmi, Abu Jafar, Md Muzahid, Al-Imran, Md.

    Published 2021
    “…We’ve achieved better for SJF and a decent machine learning algorithm outcome as well.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…In this research, an approach has been proposed that explores the combination of genetic algorithms with static analysis, and a code replacement method to address the problem of XSS at the source code level. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Development of cell formation algorithm and model for cellular manufacturing system by Nouri, Hossein

    Published 2011
    “…The results show proposed algorithm approximately solved problems averagely 22% better in terms of find feasible optimal solutions depends of various performance measures in 72.2% of computational time than other previous considered key algorithms.…”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Fairness Categorization Policy Of Queuing Theory For Geographic Information System Job Scheduling by Kheoh, Hooi Leng

    Published 2013
    “…Each category of jobs is served along with First-Come First-Served (FCFS) basic using the Multiple Queues Multiple Machines (MQMM) configuration. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review by Mat Ripah N.A., Abdul Latif A., Che Cob Z., Mohd Drus S., Md Anwar R., Mohd Radzi H.

    Published 2024
    “…Furthermore, it is also shown that various machine learning algorithms are used, and the most used are Neural Network and Support Vector Machine. …”
    Conference Paper
  17. 17

    A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective by Ul haq, Riaz, Norrozila, Sulaiman, Muhammad, Alam

    Published 2013
    “…Machine learning algorithms are iteration based algorithms, as the new knowledge is based on the previous predicted /calculated knowledge which helps to decrease errors in order to increase efficiency. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20

    Shot boundary detection based on orthogonal polynomial by Abdulhussain, Sadiq H., Ramli, Abd Rahman, Mahmmod, Basheera M., Saripan, Mohd Iqbal, Al-Haddad, Syed Abdul Rahman, Jassim, Wissam A.

    Published 2019
    “…Finally, the support vector machine is utilized to detect hard transitions. In addition, a comparison between the proposed algorithm and other state-of-the-art algorithms is performed to reinforce the capability of the proposed work. …”
    Get full text
    Get full text
    Get full text
    Article