Search Results - (( variable activation function algorithm ) OR ( java detection approach algorithm ))
Search alternatives:
- function algorithm »
- java detection »
- variable »
- activation »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
5
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
Data-Driven Approach to Modeling Biohydrogen Production from Biodiesel Production Waste: Effect of Activation Functions on Model Configurations
Published 2022“…The RBFNN model with softmax as the hidden layer activation function and identity as the outer layer activation function has the least predictive performance, as indicated by an R2 of 0.403 and a RMSE of 301.55. …”
Get full text
Get full text
Article -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…The research experiment has shown the process of calculating the Distance matrix for the sample Java Programs and subsequent evaluation using the mutation testing approach and APFD calculation. …”
Get full text
Get full text
Get full text
Article -
10
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…To improve the rate of fault detection during several TCP approaches are proposed for regression testing. …”
Get full text
Get full text
Thesis -
11
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Utilization of soft-computing algorithms in the operation of Shunt Active Power Filters (SAPFs) becomes a latest trend. …”
Get full text
Get full text
Thesis -
12
-
13
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
Get full text
Get full text
Article -
14
Real time De-mixing system based on LMS adaptive algorithm for blind two source signals separation
Published 2007“…The time variant mixing matrix based on random vector with time variable elements are made. Several simulations obtain optimum results of implemented algorithm. …”
Get full text
Conference or Workshop Item -
15
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Mostly, the Man In The Middle (MITM) attack happens in this stage by hijacking active session variables, manipulating files and objects. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments
Published 2021“…The estimation is accomplished by calculating the membership function based on the experts’ views in any form (symmetric or non-symmetric) with lowly or highly overlapped linguistic variables. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments
Published 2021“…The estimation is accomplished by calculating the membership function based on the experts’ views in any form (symmetric or non-symmetric) with lowly or highly overlapped linguistic variables. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
A novel inertia moment estimation algorithm collaborated with active force control scheme for wheeled mobile robot control in constrained environments
Published 2021“…The estimation is accomplished by calculating the membership function based on the experts’ views in any form (symmetric or non-symmetric) with lowly or highly overlapped linguistic variables. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance
Published 2019“…The three different optimization algorithms used in this study are the genetic algorithm (GA), particle swarm optimization (PSO) algorithm and shark machine learning algorithm (SMLA). …”
Get full text
Get full text
Article -
20
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis
