Search Results - (( web application ((a algorithm) OR (bees algorithm)) ) OR ( site detection based algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…This research aim to solve these issues by developing a detection model for detecting and recognizing the web vulnerabilities based on the defined and identified criteria. …”
    Get full text
    Get full text
    Research Reports
  4. 4

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…Machine learning is a hot topic and it is widely implemented in software, web application and more. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony by Mohd Izuddin Sipluk

    Published 2022
    “…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7
  8. 8
  9. 9

    Objects tracking from natural features in mobile augmented reality by Ng, Edmund Giap Weng, Rehman, Ullah Khan, Shahren, Ahmad Zaidi Adruce, Oon, Yin Bee

    Published 2013
    “…The pose matrix from extracted features was calculated by Homography. The adapted algorithm was tested in a mobile AR-prototype application using iPhone. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site by Wanbo, Luo

    Published 2025
    “…Based on You Only Look Once (YOLO) v5, A cloud-based real-time hardhat-wearing compliance detection system was proposed to detect workers not wearing hardhats in power construction sites. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Wind direction and speed estimation for quadrotor based gas tracking robot by Eu, Kok Seng *, Chia, Wei Zheng, Yap, Kian Meng *

    Published 2017
    “…This paper proposes a quadrotor based gas tracking robot to be used in hazardous gas localization areas, and specifically, to detect methane leak from gas extraction sites. …”
    Get full text
    Book Section
  15. 15
  16. 16

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…It proposes an enhanced genetic algorithm-based approach that detects cross-site scripting vulnerabilities in mobile versions of web applications. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…Transferability of each of the models was verified by testing in another site for consistency. The overall accuracy of the Support Vector Machine SVM and Random Forest RF classifiers revealed that three of the six algorithms exhibited higher ranks in the landslide detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    A buffer-based online clustering for evolving data stream by Islam, Md. Kamrul, Ahmed, Md. Manjur, Kamal Z., Zamli

    Published 2019
    “…In this study, we present a fully online density-based clustering algorithm called buffer-based online clustering for evolving data stream (BOCEDS). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…It is a windows application mixed with web connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis