Search Results - (( java web detection algorithm ) OR ( program visualisation using algorithm ))
Search alternatives:
- program visualisation »
- visualisation using »
- using algorithm »
- web detection »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
Get full text
Get full text
Conference or Workshop Item -
3
Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi
Published 2015“…Algorithm visualisation (AV) can be utilised to improve students ’programming and programme comprehension skills. …”
Get full text
Get full text
Get full text
Article -
4
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
6
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
7
The efficacy of personal computer (PC) AI image enhancer software on low and high contrast PA chest radiograph: an experimental study
Published 2026“…Methods: An experimental investigation was undertaken using five PC AI image enhancer programs to visualise the thoracic anatomy. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Visualisation tool to study malaria transmission using network modelling
Published 2014“…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code
Published 2018“…The iterative reconstruction algorithms is used to generate and calculate the 2600 coordinates of calibration map from the number of photon counts from the ten NaI scintillation detectors. …”
Get full text
Get full text
Get full text
Article -
11
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…This application, integrated with a predictive model, offers real-time visualisation of primary cooling system characteristics through handheld devices. …”
Get full text
Get full text
Thesis -
12
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
FBGA-based implementation of electronic abacus using altera DE2 board
Published 2017“…The development of electronic abacus is to integrate the use of abacus along with electronic devices which offers better visualisation of the abacus operations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Extracting Object Oriented Software Architecture from C++ Source Code
Published 2000Get full text
Get full text
Thesis -
15
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Modified dynamic programming model with limited order picking capacity / Noraimi Azlin Mohd Nordin
Published 2021“…Next, to determine either Dijsktra’s algorithm or Dynamic Programming Method will give the most accurate shortest path and minimum travel time for order pickers. …”
Get full text
Get full text
Get full text
Thesis
