Search Results - (( web application matching algorithm ) OR ( its applications mobile algorithm ))*
Search alternatives:
- application matching »
- applications mobile »
- its applications »
- mobile algorithm »
- web application »
-
1
Web Based Supervisor Supervisee Project Matching System
Published 2010Get full text
Get full text
Get full text
Thesis -
2
Web application vulnerabilities detection model
Published 2016“…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
3
Adaptive web service selection based on data type matching for dynamic web service composition
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
A new split based searching for exact pattern matching for natural texts
Published 2018“…Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. …”
Get full text
Get full text
Article -
6
ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad
Published 2023“…The web application offers functionality for students to search and filter scholarships to suit their preferences or needs and the most relevant scholarships are provided based on matching algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Web-based volunteer management system
Published 2025“…Key innovations include a weighted skill-matching algorithm that evaluates both skills importance level required and volunteer proficiencies, a distance-based matching algorithm using Google Maps Distance Matrix API, and leaderboard gamification elements for volunteer contribution recognition. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
-
10
Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan
Published 2020“…The system uses the Rapid Application Development (RAD) methodology in system development and will be operate on a web-based platform. …”
Get full text
Get full text
Thesis -
11
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…Mobility allows mobile node to communicate even distances away without restarting any applications in use. …”
Get full text
Get full text
Thesis -
12
-
13
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…Previous studies have not yet designed such a system that is reliable enough for such critical applications. This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
14
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
Get full text
Get full text
Final Year Project -
15
Scan Matching and KNN Classification for Mobile Robot Localisation Algorithm
Published 2017Get full text
Get full text
Conference or Workshop Item -
16
Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX.
Published 2013“…Simulation results show that the proposed FuzSAHO algorithm reduces the number of ping-pong handover and its delay. …”
Get full text
Get full text
Article -
17
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…Applications of mobile robots cover both industrial and domestic area. …”
Get full text
Get full text
Book Chapter -
19
-
20
A new efficient checkpointing algorithm for distributed mobile computing
Published 2015“…This algorithm is characterized by its efficiency and optimization in terms of incurred time-space overhead during checkpointing process and normal application running period.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
