Search Results - (( basic ((computing path) OR (computing can)) algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- computing path »
- computing can »
-
1
Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman
Published 2020“…It can be concluded that Basic Theta* can produce a shorter path compared to A* but with the price of having a higher computation time. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
Investigating and developing the best method in shortest path for implementing a geographical information system (e-map) for Peninsular Malaysia
Published 2005“…Assessment will be done by calculating the algorithm complexion and runtime using the computer. …”
Get full text
Get full text
Monograph -
5
Travelling Salesman Problem using Prim Algorithm in High Performance Computing
Published 2007“…This preliminary report emphasizes on the basic terms of the efficient job scheduling algorithm for traveling salesman problem in high performance computing. …”
Get full text
Get full text
Final Year Project -
6
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…Next, future research can be further by enhancing the heuristic computation in JPS or other path finding technique by considering weightage heuristic cost.…”
Get full text
Get full text
Get full text
Thesis -
7
Unconstraint assignment problem : a molecular computing approach
Published 2006“…The proposedapproach basically consists of two phases; encoding phase and computational phase. …”
Get full text
Get full text
Article -
8
-
9
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2023Article -
10
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
11
MOTION TARGET TRACKING OF MOBILE ROBOTS
Published 2015“…The main hardware and has been tested with basic programs based on the algorithms of the said methods. …”
Get full text
Get full text
Final Year Project -
12
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…Multi-functional nodes are the basic unit of WSN for the current era of sensing the environmental changes, communication and computation aptitudes [Villalba et al 2009]. …”
Get full text
Get full text
Conference or Workshop Item -
13
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…Finally, the proposed ASH was tested on two well known benchmark data sets to evaluate its performance and effectiveness. The computational results suggest that the AS approach embedded with heuristic(s) outperforms the pure AS algorithm. …”
Get full text
Get full text
Thesis -
14
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…It is observed that the APFLC showed convincing performance over the entire simulation of the Pico-satellite. Genetic Algorithm (GA) is a computational model inspired by evaluation. …”
Get full text
Thesis -
15
The enhanced fault-tolerant AODV routing protocol for Wireless Sensor Network
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer B will send the data to the BASIC Stamp and the BASIC Stamp will check their program. …”
Get full text
Get full text
Monograph -
18
Evaluation of stereo matching algorithms and dynamic programming for 3D triangulation
Published 2015“…The stereo matching algorithms that we applied for experimental purpose are basic block matching, sub-pixel accuracy and dynamic programming. …”
Get full text
Get full text
Book Chapter -
19
Voting algorithms for large scale fault-tolerant systems
Published 2011“…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
Get full text
Get full text
Thesis -
20
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…However, information collected using recommendations are vulnerable to dishonest recommendation attacks that can potentially mislead the trust computation engine. …”
Get full text
Get full text
Get full text
Thesis
