Search Results - (( _ application need algorithm ) OR ( web application ((path algorithm) OR (bat algorithm)) ))
Search alternatives:
- application need »
- web application »
- need algorithm »
- path algorithm »
- bat algorithm »
-
1
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. The result of the algorithm performance will be appeared in web application system. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
A Dijkstra’s Mobile Web Application Engine for Generating Integrated Light Rail Transit Route
Published 2010“…In previous research we are implemented the mobile web application using rules based algorithm where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
Get full text
Get full text
Get full text
Article -
3
Optimization of LRT Route for Mobile Web Application Engine
Published 2009“…In previous research we already implement the mobile web application architecture where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A Mobile Web Application Engine for Generating Destination-oriented LRT Route
Published 2009“…In previous research we already implement the mobile web application architecture where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. …”
Get full text
Get full text
Thesis -
7
-
8
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…The test was conducted using eleven PHP Web applications: ten applications available on the internet and that other researchers have used and one application that the researcher developed. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
A review of slicing techniques in software engineering
Published 2015“…This specific survey focuses on slicing techniques in the fields of numerous programing paradigms like web applications, object oriented, and components based. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Statistical selection algorithm for peer-to-peer system
Published 2008Get full text
Get full text
Get full text
Article -
13
-
14
Revisit of statistical selection algorithm for peer-to-peer system
Published 2008Get full text
Get full text
Conference or Workshop Item -
15
Healthy Lifestyle Management System
Published 2011“…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
Get full text
Get full text
Final Year Project -
16
-
17
-
18
Improvement and performance analysis on statistical selection algorithms
Published 2006Get full text
Get full text
Conference or Workshop Item -
19
-
20
Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm
Published 2018Get full text
Get full text
Monograph
