Search Results - (( based application interface algorithm ) OR ( java optimization path algorithm ))

Refine Results
  1. 1

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Brain Machine Interface Controlled Robot Chair by Hema Chengalvarayan, Radhakrishnamurthy

    Published 2010
    “…A particle swarm optimization based algorithm is proposed to train the neural networks. …”
    Get full text
    Thesis
  6. 6

    Development of real-time software interface for multicomponent transient signal analysis using Labview and Matlab by Salami, Momoh Jimoh Emiyoka, Tijani, Ismaila, Jibia, Abdussamad Umar

    Published 2011
    “…Though, a Matlab-based algorithm has been developed in the previous study on multicomponent signal analysis, real-time signal analysis is required in many practical applications of such signals. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7
  8. 8
  9. 9
  10. 10

    A primary interface selection policy in heterogeneous networks based on QoS by Masud, M. H., Anwar, Farhat, Bari, S.M. Sadakatul

    Published 2012
    “…This paper proposes a policy that determines different applications’ requirements and chooses an appropriate interface as a primary interface for respective application based on the networks condition to improve Quality-of-Service (QoS). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Application of Artificial Immune Algorithm (AIA) in solving engineering problems by Lee Wee Leong

    Published 2023
    “…The outline of this project design two Graphical User Interfaces (GUI) that can solve two engineering problems based on Artificial Immune Algorithm.…”
    text::Final Year Project
  12. 12

    Application of Artificial Immune Algorithm (AIA) in solving engineering problems by Lee Wee Leong

    Published 2023
    “…The outline of this project is design two Graphical User Interfaces (GUI) that can solve two engineering problems based on Artificial Immune Algorithm.…”
    text::Final Year Project
  13. 13
  14. 14

    PIC-Based Controller for IGBT Inverter for 3-Phase Motor Drive by SUSETYO, BIANLALA

    Published 2011
    “…The controller, based on Microchip PIC, needs to be programmed with the commutation algorithm and control strategy.…”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad by Abd Rahman, Abdullah Sani, Ahmad, Samsiah

    Published 2022
    “…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article