Search Results - (( web application path algorithm ) OR ( using codification using algorithm ))
Search alternatives:
- using codification »
- codification using »
- application path »
- web application »
- using algorithm »
- path algorithm »
-
1
-
2
Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software
Published 2014“…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. …”
Get full text
Get full text
Thesis -
3
-
4
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
5
-
6
A Dijkstra’s Mobile Web Application Engine for Generating Integrated Light Rail Transit Route
Published 2010“…In previous research we are implemented the mobile web application using rules based algorithm where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
Get full text
Get full text
Get full text
Article -
7
Optimization of LRT Route for Mobile Web Application Engine
Published 2009“…In this paper, we proposed the used of Dijkstra’s Algorithms to provide more effective and intelligent shortest path system to provide the solution for traveler to reach the desired destination. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
A Mobile Web Application Engine for Generating Destination-oriented LRT Route
Published 2009“…In this paper, we proposed the used of Dijkstra’s Algorithms to provide more effective and intelligent shortest path system to provide the solution for traveler to reach the desired destination.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…The test was conducted using eleven PHP Web applications: ten applications available on the internet and that other researchers have used and one application that the researcher developed. …”
Get full text
Get full text
Thesis -
11
A review of slicing techniques in software engineering
Published 2015“…This specific survey focuses on slicing techniques in the fields of numerous programing paradigms like web applications, object oriented, and components based. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani
Published 2015“…In case of multiple filterbanks the cepstral features are used in different experts for performing classification based on different representation of speeches. …”
Get full text
Get full text
Thesis
