Search Results - (( loading optimization system algorithm ) OR ( java attack detection algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Development of bacteria foraging optimization algorithm for cell formation in cellular manufacturing system considering cell load variations by Nouri, Hossein, Tang, Sai Hong

    Published 2013
    “…This paper investigates the first applications of this emerging novel optimization algorithm to the cell formation (CF) problem. …”
    Get full text
    Get full text
    Article
  10. 10

    Optimal vehicle to grid planning and scheduling using double layer multi-objective algorithm by Tan K.M., Ramachandaramurthy V.K., Yong J.Y.

    Published 2023
    “…Algorithms; Charging (batteries); Curve fitting; Electric load flow; Electric power systems; Electric vehicles; Energy management systems; Optimization; Reactive power; Real time control; Scheduling; Vehicles; Voltage control; Voltage regulators; Battery chargers; Bidirectional power flow; Multi objective algorithm; Optimization algorithms; Reactive power compensation; Real-time implementations; Revolutionary technology; Vehicle to grids; Electric power transmission networks; algorithm; electric vehicle; electricity supply; energy flow; energy planning; energy use; optimization; technological development…”
    Article
  11. 11

    Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar by Vijyakumar, Kanendra Naidu

    Published 2015
    “…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimal design of EV aggregator for real-time peak load shaving and valley filling by Solanke T.U., Khatua P.K., Ramachandaramurthy V.K., Yong J.Y., Kanesan J., Tariq M., Kasinathan P.

    Published 2023
    “…Battery management systems; Dynamic loads; Energy management systems; Genetic algorithms; Landforms; Optimal systems; Power electronics; Deterministic optimization; Fluctuating loads; Grid-connected; Matlab Simulink models; Optimal design; Optimization algorithms; Real-time application; State of charge; Electric power transmission networks…”
    Conference Paper
  13. 13

    One day ahead daily peak hour load forecasting by using invasive weed optimization learning algorithm based Artificial Neural Network by Rahim, Muhammad Fitri

    Published 2012
    “…In this project, an Artificial Neural Network (ANN) trained by the Invasive Weed Optimization (IWO) learning algorithm is proposed for short term load forecasting (STLF) model. …”
    Get full text
    Get full text
    Student Project
  14. 14

    A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system by Rana, M.M., Romlie, M.F., Abdullah, M.F., Uddin, M., Sarkar, M.R.

    Published 2021
    “…This algorithm will help an IMG system to operate its generation systems optimally and economically along with PV generation unit. …”
    Get full text
    Get full text
    Article
  15. 15

    Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices by Ali Abdallah, Ali Emhemed

    Published 2021
    “…To solve this problem, an optimal load shedding approach, integrated with optimal DG sizing is proposed using the ABC-HC algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimal chiller loading solution for energy conservation using Barnacles Mating Optimizer algorithm by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2022
    “…This paper proposes an application of evolutionary optimization algorithm, Barnacles Mating Optimizer (BMO) to solve the optimal chiller loading (OCL) problem for minimization of the power consumption in the multi chiller system. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing by Elrasheed Ismail, Sultan

    Published 2013
    “…The choice of a scheduling strategy has significant impact on the runtime Central Processing Unit, memory consumption as well as the storage systems. Load balancing optimization techniques such as Ant Colony Optimization (ACO), First Come First Served (FCFS), Round Robin (RR) and Particle Swarm Optimization (PSO) are popular techniques being used for scheduling and load balancing. …”
    Get full text
    Thesis
  18. 18
  19. 19

    Bacterial foraging optimization algorithm for optimal load shedding in power systems / Wan Nur Eliana Afif Wan Afandie by Wan Afandie, Wan Nur Eliana Afif

    Published 2016
    “…By using Bacterial Foraging Optimization Algorithm (BFOA) technique, for each types of load shedding, the simulations are tested on IEEE 30-bus system for 3 and 5 load shedding locations. 3 different load conditions and one line outage cases are tested for 3 objective function and 3 multi-objective functions. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat by Minhat, Abdul Rahman

    Published 2008
    “…The strength of EP in this study was evaluated in terms of its capability to search for the accurate solution and fast computation time. Consequently, the algorithm for load increase simultaneously at several load buses was also developed in order to search the optimal value at each bus in a system such that the system can maintain a stable condition. …”
    Get full text
    Get full text
    Thesis