Search Results - (( _ constructive ((method algorithm) OR (path algorithm)) ) OR ( java application a algorithm ))
Search alternatives:
- method algorithm »
- java application »
- path algorithm »
- application a »
- a algorithm »
- constructive »
-
1
Route optimization using shortest path method / Muhamad Faisal Amin Shakri
Published 2025“…This study investigated the implementation and comparison between well known shortest path method which are Dijkstra’s algorithm, Bellman-Ford, and A* algorithm. …”
Get full text
Get full text
Thesis -
2
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
Get full text
Thesis -
3
-
4
An efficient algorithm to improve oil-gas pipelines path
Published 2018“…Therefore, the aim of this study is to propose a new algorithm to obtain the shortest path connecting oil-gas wells and addressing obstacles that may appear on the path connecting any two wells. …”
Get full text
Article -
5
Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques
Published 2014“…The aim is to solve the above-mentioned problems via an optimization mechanism based upon the combination between runtime path prediction method and heuristic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Optimizing optimal path trace back for Smith-Waterman algorithm using structural modelling technique
Published 2012“…The optimizing of optimal path trace back system for Smith-Waterman algorithm using structural modelling techniques are presented in this paper. …”
Get full text
Get full text
Student Project -
7
An application of Floyd-Warshall Algortihm in finding shortest path of order picker in warehouse / Saidatul Aisyah Roslan, Siti Norhakimah Mohd Yatim and Siti Sarah Sulaiman
Published 2019“…For the result, shortest path for the order pickers in iterations. The algorithm used can help the order picker to have the shortest path, but it have no direct path. …”
Get full text
Get full text
Student Project -
8
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…For detecting infeasible paths that involve Object Constraints Language (OCL) constraints, new method is needed to cover all the sophisticated constructs of OCL. …”
Get full text
Get full text
Get full text
Thesis -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
10
MAZE ROBOT: APPLYING AUTONOMOUS VEHICLE NAVIGATION ALGORITHM WITH EVENT-DRIVEN PROGRAMMING
Published 2011“…Hardware and software co-design method is used to construct the mobile robot. The basic navigation algorithm was developed using finite state machine (FSM). …”
Get full text
Get full text
Final Year Project -
11
Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam
Published 2015“…The results of the fingerprint algorithm for localization shows higher accuracy compare to other methods and the implementation of this method are easy as user require only a mobile device equipped with Wi-Fi facilities to determine the location. …”
Get full text
Get full text
Thesis -
12
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
13
HTS : a hierarchical method for load balancing in autonomous networks.
Published 2008“…Proposed algorithm fulfills at two steps. Firstly overload detection function through an explorer algorithm to construct overloaded link table due to disruption link. …”
Get full text
Get full text
Article -
14
Mining Sequential Patterns using I-PrefixSpan
Published 2008“…Thus, with I-PrefixSpan there is no in-memory database stored after index set is constructed. The experimental result shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.…”
Get full text
Get full text
Citation Index Journal -
15
Development of obstable avoidance system for 3D robot navigation
Published 2024“…Additionally, the planner and controller modules from Nav2 were employed for path planning and obstacle avoidance. Once the algorithm was fully tested and proven functional in simulation, it would be implemented on the physical robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Design and modelling of an autonomous robotic airship with soft computing control
Published 2012“…Along with the prototype airship, a path planner was also proposed for the UAV for the purpose of obstacle avoidance and path optimization using genetic algorithm to minimize on the distance travelled and to generate the shortest path to cover the specified waypoints. …”
Get full text
Get full text
Get full text
Thesis -
17
Frequent itemset mining using graph theory / Mohammad Arsyad Mohd Yakop
Published 2017“…The searching process in the FR-Graph involves the construction of two methods: getPath and item-merging. …”
Get full text
Get full text
Thesis -
18
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Modeling and Implementation of Omni-directional soccer robot with wide vision scope applied in Robocup-MSL
Published 2009Get full text
Working Paper -
20
Exponential Parameterized Cubic B-Spline Curves And Surfaces
Published 2020“…The algorithm computes knot values for parameterization methods. …”
Get full text
Get full text
Thesis
