Search Results - (( automatic identification path algorithm ) OR ( java applications usage algorithm ))
Search alternatives:
- identification path »
- applications usage »
- java applications »
- usage algorithm »
- path algorithm »
-
1
Gait identification and optimisation for amphi-underwater robot by using ant colony algorithm
Published 2019“…It is very difficult to estimate the movement of the robot to avoid obstacles and choose the alternative path. Hence, this research presents the point-to-point gait identification or path planning of the behavious of the robot to manuever autonomously on both on-land and underwater environment. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Machine Learning-Enabled Communication Approach for the Internet of Medical Things
Published 2023“…For this purpose, the proposed scheme utilises a well-known technique, i.e., Kruskal’s algorithm, to find an optimal path from source to destination wearable devices. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things
Published 2020“…A new design concept is established for the patient identification mechanism, where the mechanism is embedded in the source device to enhance the ability of the system to automatically assign the identification number to each blood glucose measurement (mmol/L) during multiple patients monitoring. …”
Get full text
Get full text
Thesis -
5
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
6
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…The experimental result shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.…”
Get full text
Get full text
Get full text
Conference or Workshop Item
