Search Results - (( programming validity detection algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Lettuce Leaf Disease Detection Using Convolutional Neural Network Algorithm by NGU, SU HANG

    Published 2023
    “…The detection algorithm will be develop based on a modified AlexNet model. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11
  12. 12

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Ischemic Stroke Detection System With Computer Aided Diagnostic Capability by Lina, Tay

    Published 2017
    “…Since the evaluation requires human experts, limited number of experts makes the manual emboli detection a challenging task. Therefore, this project is to develop program for automated emboli detection. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Vision Based Multi Sensor Feedback System For Robot System With Intelligent by Syed Mohamad Shazali, Syed Abdul Hamid

    Published 2009
    “…Finally, a set of experiments to validate the proposed algorithms has been conducted. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Prediction of novel doping agent using an in silico model that integrates chemical, biological and phenotypic data by Jamil, Nurul Amalina

    Published 2016
    “…These models were validated using five-fold cross validation to evaluate their predictive power. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Leaf condition analysis using convolutional neural network and vision transformer by Yong, Wai Chun, Ng, Kok Why, Haw, Su Cheng, Naveen, Palanichamy, Ng, Seng Beng

    Published 2024
    “…Besides, existing leaf disease detection programs do not provide an optimized user’s experience. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…The evaluation results are promising as the empirical validation has proven that the proposed approach has a higher precision of detecting XSS vulnerabilities than previously proposed solutions it is compared to. …”
    Get full text
    Get full text
    Thesis