Search Results - (( some applications ((out algorithm) OR (bat algorithm)) ) OR ( web application a algorithm ))*
Search alternatives:
- some applications »
- web application »
- out algorithm »
- bat algorithm »
- application a »
- a algorithm »
-
1
Web application vulnerabilities detection model
Published 2016“…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
2
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
4
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
5
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
Application of adaptive bats sonar algorithm to minimise car side impact design
Published 2017“…This project was focusing on the modification of bats sonar algorithm (BSA) and renamed to adaptive bats sonar algorithm (ABSA) due to some limitations of previous algorithm. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…Three different optimization algorithms which are Bat Algorithm (BA), Bat Algorithm with Mutation (BAM) and Extended Bat Algorithm (EBA) are implemented to optimize the value of PID controller gain for wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
10
Registration and billing system
Published 2005“…To view the patient data and records, the bubble sort sorting algorithm has been applied.By applying this algorithm into the system prototype,the user of the system can get easily to look for the patient records in a list. …”
Get full text
Get full text
Undergraduates Project Papers -
11
-
12
-
13
Studies on flat CORDIC implementation in field programmable gate arrays (FPGA) / Meera Subramaniam
Published 2004“…These operations map well onto hardware, and CORDIC is used in a multitude of signal processing applications. …”
Get full text
Get full text
Thesis -
14
-
15
PID controller design for mobile robot using Bat Algorithm with Mutation (BAM)
Published 2019“…Here, an optimization algorithm called Bat Algorithm with Mutation (BAM) is proposed to optimize the value of PID controller gain for mobile robot. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A Web Based System For Evaluating Occupational Stress
Published 2007Get full text
Get full text
Get full text
Article -
17
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…Three recurring issues need to be addressed when constructing such solutions: 1) How to identify the device characteristic and the capabilities of a device, 2) How to find out about network resource availability, and 3) How to adapt application behavior. …”
Get full text
Get full text
Thesis -
18
Online zakat application system for UiTM Tapah using fuzzy logic / Maizatul Asyikin Mokhtar
Published 2016“…This research is about the application of fuzzy logic algorithm in applying zakat. …”
Get full text
Get full text
Thesis -
19
-
20
Benchmarking of Bat-inspired Interaction Testing Strategy
Published 2016Get full text
Get full text
Get full text
Article
