Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (3)
An Architectural Approach To Forestalling Code
no vote
An Architectural Approach To Forestalling Code Injection. Code injection is an action by the attacker to introduce the code into the computer memory to change the execution of the program. Code injection can be prevented through architectural approach. This can be done through split memory technique.  Split memory deals with change in memory architecture by virtually splitting it into two segments i.e. code segment and data segment. The change in architecture does not allow the intruder to take charge of the injected code, as the injected code remains non-executable. In addition, memory split technique detects the code injection attack, where the injected attack code is ready to run but not executed yet. There are three response modes like break, observe and track. This allows the intruders to perform their own activity; thereby the details of the intruders can be known who try to m
lava858936
2017-03-15
0
1
Breast Cancer use global similarity
no vote
The name of the data set is Haberman's SurvivalDataset (March 4, 1991). The dataset contains cases from a study that wasconducted between 1958 and 1970 at the University of Chicago's BillingsHospital on the survival of patients who had undergone surgery for breast cancer.[3]
lava858936
2016-08-23
0
1
Student Advisory System
no vote
A Student Advisory System or SAS website is a web application for user to get more infomation about students. This system developed using Net bean Software. The user for this system is an advisor which is majority who is lecturer that act sas academic advisor for their students. The advisor can add details, delete,edit and view their advisee. There are four main modules which are add advi see,edit advi see, delete advi see and view advi see. Besides that, this system also provides search advi see.
lava858936
2016-08-23
0
1
No more~