Search Results - (( _ application a algorithm ) OR ( site detection based algorithm ))
Search alternatives:
- detection based »
- site detection »
- application a »
- a algorithm »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
4
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017Get full text
Get full text
Final Year Project -
5
Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site
Published 2025“…Based on You Only Look Once (YOLO) v5, A cloud-based real-time hardhat-wearing compliance detection system was proposed to detect workers not wearing hardhats in power construction sites. …”
Get full text
Get full text
Thesis -
6
Cyberbullying detection: a machine learning approach
Published 2022“…This model combines a rule-based approach of sentiment analysis and a supervised machine learning algorithm to classify the text. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Web application vulnerabilities detection model
Published 2016“…This research aim to solve these issues by developing a detection model for detecting and recognizing the web vulnerabilities based on the defined and identified criteria. …”
Get full text
Get full text
Research Reports -
8
Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System
Published 2010“…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
Get full text
Get full text
Get full text
Article -
9
Image Detection Model for Construction Worker Safety Conditions using Faster R-CNN
Published 2024journal::journal article -
10
Classification of Emphysema Patterns in Computed Tomography Based On Gabor Filter
Published 2015“…In this research, a Gabor-based emphysema classification algorithm is proposed. …”
Get full text
Get full text
Final Year Project -
11
Integration of object-based image analysis and data mining techniques for detailes urban mapping using remote sensing
Published 2015“…The proposed OBIA rule sets were automatically organized from the C4.5 algorithm to form a decision tree structure that explores a wide range of spectral, spatial, and textural attributes. …”
Get full text
Get full text
Thesis -
12
Online Transaction Fraud Detection Using Backlogging On E-Commerce Website: A Review
Published 2024Article -
13
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
Get full text
Get full text
Thesis -
14
An object-based approach to detect tree stumps in a selective logging area using Unmanned Aerial Vehicle imagery
Published 2021“…This research implemented a technique for detecting, segmenting, classifying, and measuring tree stumps by using the Multiresolution Segmentation Algorithm method. …”
Get full text
Get full text
Get full text
Article -
15
Detecting video spammers in YouTube social media
Published 2017“…Even though the detection of malicious users is based on various features such as content details, social activity, social network analyzing, or hybrid, the detection rate is still considered low (i.e. 46%).This study proposes a new set of features by constructing features based on the Edge Rank algorithm.Experiments were performed using nine classifiers of different learning; decision tree, function-based and Bayesian. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Distribution network fault section estimation using analytical database approach
Published 2004“…The fault needs to he detected, located and cleared as soon as possible. …”
Get full text
Get full text
Get full text
Thesis -
17
Development of IoT-based automated dynamic emergency response system against fire incidents in academic building
Published 2023“…This study aims to address the need for improved firefighting systems in academic building by proposing the development of an IoT-based automated emergency response website. The proposed system leverages IoT technology, wireless and bluetooth sensor networks to gather real-time data from various sensors and devices installed in the site and uses machine learning algorithms to predict and prevent potential fire incidents. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Cheating Detection in Examinations Using Improved YOLOv8 with Attention Mechanism
Published 2024“…To improve the speed of video detection, a student's abnormal-behavior detection method was proposed based on improved YOLOv8 and attention mechanism to achieve real-time detection of cheating actions in an exam room on a regular performance computer. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published 2023“…Thus, this study attempts to fill the gap by proposing a feature drift-aware algorithm for detecting the evolved XSS attacks. …”
Get full text
Get full text
Get full text
Article -
20
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
Get full text
Get full text
Thesis
