Search Results - (( web application ((bat algorithm) OR (path algorithm)) ) OR ( some applications a algorithm ))*
Search alternatives:
- some applications »
- web application »
- path algorithm »
- applications a »
- bat algorithm »
- a algorithm »
-
1
A Dijkstra’s Mobile Web Application Engine for Generating Integrated Light Rail Transit Route
Published 2010“…In previous research we are implemented the mobile web application using rules based algorithm where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
Get full text
Get full text
Get full text
Article -
2
Optimization of LRT Route for Mobile Web Application Engine
Published 2009“…In this paper, we proposed the used of Dijkstra’s Algorithms to provide more effective and intelligent shortest path system to provide the solution for traveler to reach the desired destination. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
4
A Mobile Web Application Engine for Generating Destination-oriented LRT Route
Published 2009“…In this paper, we proposed the used of Dijkstra’s Algorithms to provide more effective and intelligent shortest path system to provide the solution for traveler to reach the desired destination.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. …”
Get full text
Get full text
Thesis -
7
A review of slicing techniques in software engineering
Published 2015“…Quite a large numbers of variants for the program slicing have been analyzed along with the algorithms to compute the slice. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
-
9
-
10
-
11
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…The test was conducted using eleven PHP Web applications: ten applications available on the internet and that other researchers have used and one application that the researcher developed. …”
Get full text
Get full text
Thesis -
12
-
13
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
14
Implementation of Cognitive Mapping Algorithm for Robot Navigation System
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
18
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…For example in England, there are eight million people having skin disorder problems [16]. The effectiveness of a treatment depends on the type of the skin disorder, as some disorders can be easily managed by creams and ointments and some need long-term treatments. …”
Get full text
Get full text
Final Year Project -
19
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
20
On density-based data streams clustering algorithms: A survey
Published 2017“…Due to data streams characteristics, the traditional density-based clustering is not applicable. Recently, a lot of density-based clustering algorithms are extended for data streams. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
