Search Results - (( its application bat algorithm ) OR ( web application security algorithm ))*
Search alternatives:
- its application »
- application bat »
- web application »
- bat algorithm »
-
1
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…The works related to swarm intelligence algorithms include the development of the algorithm itself, its modification and improvisation as well as its application in solving global optimisation problems. …”
Get full text
Get full text
Thesis -
2
A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm
Published 2013“…Each bat in Bat Algorithm represents a candidate solution for the problem and each dimension in the search space of the Bat Algorithm represents a parameter of intrinsic parameters: skew, focal length, and magnification factor. …”
Get full text
Get full text
Conference or Workshop Item -
3
An improved genetic bat algorithm for unconstrained global optimization problems
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Modified adaptive bats sonar algorithm with doppler effect mechanism for solving single objective unconstrained optimization problems
Published 2019Get full text
Get full text
Conference or Workshop Item -
6
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…Three different optimization algorithms which are Bat Algorithm (BA), Bat Algorithm with Mutation (BAM) and Extended Bat Algorithm (EBA) are implemented to optimize the value of PID controller gain for wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
7
-
8
-
9
-
10
-
11
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
12
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
13
PID controller design for mobile robot using Bat Algorithm with Mutation (BAM)
Published 2019“…Here, an optimization algorithm called Bat Algorithm with Mutation (BAM) is proposed to optimize the value of PID controller gain for mobile robot. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems
Published 2024“…The Modified Adaptive Bats Sonar Algorithm (MABSA), initially designed for single objective optimization and inspired by colony bats' echolocation, has demonstrated efficiency with its simple structure and reduced computation time. …”
Get full text
Get full text
Thesis -
15
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…Even though security requirements in medical care are traditionally high, most computerized medical care applications lack sophisticated security measures or focus only on single security objectives. …”
Get full text
Get full text
Thesis -
16
-
17
Secure mobile AES encryptor (SMAE)
Published 2016“…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
Get full text
Get full text
Undergraduates Project Papers -
18
An optimized attack tree model for security test case planning and generation
Published 2018“…A 100% security risk intervention of the web application was achieved with respect to preventing SQL injection attacks after applying all security recommendations from test case execution report.…”
Get full text
Get full text
Article -
19
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
20
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
Get full text
Get full text
Get full text
Thesis
