Search Results - (( web application new algorithm ) OR ( mobile application ((bat algorithm) OR (_ algorithm)) ))

Refine Results
  1. 1

    Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm by ,, Dwi Pebrianti, Ann Ayop azmi, Nurnajmi Qasrina, Bayuaji, Luhur, Suarin, Nur Aisyah Syafinaz, ,, Muhammad Syafrullah

    Published 2022
    “…Three different optimization algorithms which are Bat Algorithm (BA), Bat Algorithm with Mutation (BAM) and Extended Bat Algorithm (EBA) are implemented to optimize the value of PID controller gain for wheel mobile robot. …”
    Get full text
    Get full text
    Book Chapter
  2. 2

    PID controller design for mobile robot using Bat Algorithm with Mutation (BAM) by Pebrianti, Dwi, Indra, Riyanto, Bayuaji, Luhur, Muhammad Syafrullah, ., Arumgam, Yogesvaran, Nurnajmin Qasrina, Ann

    Published 2019
    “…Here, an optimization algorithm called Bat Algorithm with Mutation (BAM) is proposed to optimize the value of PID controller gain for mobile robot. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Multi-Robot Learning with Bat Algorithm With Mutation (Bam) by Chandrathevan, Sathiamurthy

    Published 2022
    “…BAT algorithm is implemented to achieve the target. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Also, as more users are browsing the Internet through their mobile applications, this approach will help in protecting their private data and make browsing safer for them with both Desktop and Mobile web applications.…”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
    Proceedings Paper
  6. 6

    Route planner mobile web application for UiTM Malaysia / Suzana Ahmad ... [et al.] by Ahmad, Suzana, Mat Diah, Norizan, Mohamad Kamal, Nor Ashikin, Mohd Jailani, Siti Zalekha

    Published 2009
    “…A Route Planner Mobile Web Application for UiTM Malaysia has been developed to produce a list of routes from two selected points in order of the shortest first. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…Thus, it can be concluded that QEEA algorithm is the most energy efficient and the best candidate for provisioning the QoS for the real time (RT) and non-real time (NRT) applications.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali by Ihsan , Ali

    Published 2024
    “…To address relay node selection and data scheduling issues, Energy-Efficient Scheduling (EES) and Energy-Efficient Un-Scheduling (EEUS) methods have been introduced using the Improved Discrete Bat Algorithm (IDBA) along with the Adaptive Warshal Floyd algorithm (AWF). …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
    Get full text
    Get full text
    Student Project
  14. 14

    Lightweight Cryptography Techniques for MHealth Cybersecurity by Shahbodin, F, Azni, AH, Ali, T, Mohd, CKNCK

    Published 2024
    “…A new integration of wireless communication technologies into the mobile heath system also known as mHealth has instigated a momentous research interest in the field of mobile security. mHealth systems are unique in terms of characteristics, challenges, architecture, and applications. …”
    Proceedings Paper
  15. 15

    A Review of Multi-criteria Decision-Making Methods Using Application of Variable Weight Theory and IF-TOPSIS-EF by Ayasrah, Omar, Faiz, Mohd Turan

    Published 2021
    “…This paper represents the methodology to conduct a research that aims to combine two methods (IFS-TOPSIS-exponential based and Variable Weight Theory) in a new technique that tackles the abovementioned gaps by following induction research approach to validate the new technique by utilizing the secondary data, then to use interviews to develop the mobile application algorithm to perform solving MCDM problems virtually.…”
    Get full text
    Get full text
    Get full text
    Book Chapter
  16. 16
  17. 17

    Online zakat application system for UiTM Tapah using fuzzy logic / Maizatul Asyikin Mokhtar by Maizatul Asyikin, Mokhtar

    Published 2016
    “…This research is about the application of fuzzy logic algorithm in applying zakat. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20