Search Results - (( web application detection algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
    Get full text
    Get full text
    Research Reports
  3. 3

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Comparisons of the evaluation results have shown improvements in the detection and removal of XSS vulnerabilities in desktop and mobile web applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…It proposes an enhanced genetic algorithm-based approach that detects cross-site scripting vulnerabilities in mobile versions of web applications. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan by Shahron Nizan, Muhammad Shahmi

    Published 2023
    “…This project aims to develop a web-based application utilizing the Random Forest Classification Algorithm to aid concerned parents in detecting potential Autism Spectrum Disorder (ASD) symptoms in their children aged 1-6 years in Malaysia. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Target heart rate zone detector during exercise based on real-time facial expression using single shot detection algorithm / Muhammad Azziq Shamsudin, Raihah Aminuddin and Ummu Mar... by Shamsudin, Muhammad Azziq, Aminuddin, Raihah, Abdul Jalil, Ummu Mardhiah

    Published 2022
    “…The web application requires the user to input of their Rest Heart Rate (RHR), age and level of exercise intensity to produce output of THR zone according to their facial expression. …”
    Get full text
    Get full text
    Get full text
    Book Section
  15. 15

    A malicious URLs detection system using optimization and machine learning classifiers by Lee, Ong Vienna, Heryanto, Ahmad, Mohd Faizal, Ab Razak, Anis Farihan, Mat Raffei, Eh Phon, Danakorn Nincarean, Shahreen, Kasim, Sutikno, Tole

    Published 2020
    “…This study aims to assess the efficiency of the machine learning approach to detect and identify malicious URLs. In this study, we applied features optimization approaches by using a bio-inspired algorithm for selecting significant URL features which able to detect malicious URLs applications. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Car license plate detection method for Malaysian plates-styles by using a web camera by Al-Ghaili, Abbas Mohammed Ali, Mashohor, Syamsiah, Ramli, Abdul Rahman, Ismail, Alyani

    Published 2010
    “…Recently, license plate detection has been used in many applications especially in transportation systems. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20