Search Results - (( some applications ((a algorithm) OR (bat algorithm)) ) OR ( web applications using algorithm ))*
Search alternatives:
- applications using »
- some applications »
- web applications »
- using algorithm »
- bat algorithm »
- a algorithm »
-
1
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
2
Application of adaptive bats sonar algorithm to minimise car side impact design
Published 2017“…This project was focusing on the modification of bats sonar algorithm (BSA) and renamed to adaptive bats sonar algorithm (ABSA) due to some limitations of previous algorithm. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
PID controller design for mobile robot using Bat Algorithm with Mutation (BAM)
Published 2019“…This algorithm is compared with a wellknown optimization algorithm, Particle Swarm Optimization (PSO). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Web application vulnerabilities detection model
Published 2016“…As the use of the web is increasing, the use of web application is also increasing. …”
Get full text
Get full text
Research Reports -
6
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
Get full text
Get full text
Thesis -
7
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
Get full text
Get full text
Thesis -
8
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The second modification develops a new position update mechanism using the Bat Algorithm movement. …”
Get full text
Get full text
Thesis -
10
Intelligent Web caching using neurocomputing and particle swarm optimization algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
11
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
13
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
14
School teacher-subject allocation management system
Published 2024“…This project will build STSAMS as a web-based application in React.js that is equipped with API server, database, and the allotment algorithm with the Scrum methodology. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
17
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
Get full text
Get full text
Thesis -
18
-
19
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…The study expounded the classical MPA’s workflow. It also unveiled a steady upward trend in the use of the algorithm. …”
Get full text
Get full text
Article -
20
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…To solve this problem, a mobile application has been proposed for customers to order their food and drink easily and the owner can manage the order without any restrictions. …”
Get full text
Get full text
Thesis
