Search Results - (( basic computing ((data algorithm) OR (path algorithm)) ) OR ( java application a algorithm ))
Search alternatives:
- java application »
- basic computing »
- data algorithm »
- path algorithm »
- application a »
- a algorithm »
-
1
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer B will send the data to the BASIC Stamp and the BASIC Stamp will check their program. …”
Get full text
Get full text
Monograph -
2
Investigating and developing the best method in shortest path for implementing a geographical information system (e-map) for Peninsular Malaysia
Published 2005“…Assessment will be done by calculating the algorithm complexion and runtime using the computer. …”
Get full text
Get full text
Monograph -
3
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…The computational results suggest that the AS approach embedded with heuristic(s) outperforms the pure AS algorithm. …”
Get full text
Get full text
Thesis -
4
Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman
Published 2020“…It can be concluded that Basic Theta* can produce a shorter path compared to A* but with the price of having a higher computation time. …”
Get full text
Get full text
Thesis -
5
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
6
-
7
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…Machine learning algorithms are considered as an efficient way for decision making in computational environments. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
10
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…It is observed that the APFLC showed convincing performance over the entire simulation of the Pico-satellite. Genetic Algorithm (GA) is a computational model inspired by evaluation. …”
Get full text
Thesis -
11
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…Jump Point Search is one of the path finding algorithm with huge advantage of maintaining zero memory overhead as no preprocessing process involved. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
The enhanced fault-tolerant AODV routing protocol for Wireless Sensor Network
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
14
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2023Article -
15
Travelling Salesman Problem using Prim Algorithm in High Performance Computing
Published 2007“…This preliminary report emphasizes on the basic terms of the efficient job scheduling algorithm for traveling salesman problem in high performance computing. …”
Get full text
Get full text
Final Year Project -
16
Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques
Published 2021“…Therefore, in this research an algorithm has been created which can achieve the following goals. 1) To generate DTM only with LiDAR data without the need for layers and other information from the area 2) To create a building footprint from the LiDAR data by removing the tree cover effect 3) To create an automatic system that can perform the production process of DTM and footprint without the intervention of an expert. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
19
CSC645 - Algorithm Analysis and Design / College of Computing, Informatics and Media
Published 2022“…This course focuses on both the design and analysis of algorithms. It provides students with basic knowledge and techniques required to design efficient algorithms and analyse their efficiency, as well as demonstrate the key relationships between problem solving, algorithm design, data structures, programs and algorithm analysis, and the effects of the choices. …”
Get full text
Get full text
Get full text
Teaching Resource -
20
CSC645: Algorithm Analysis and Design / College of Computing, Informatics and Mathematics
Published 2019“…This course focuses on both the design and analysis of algorithms. It provides students with basic knowledge and techniques required to design efficient algorithms and analyse their efficiency, as well as demonstrate the key relationships between problem solving, algorithm design, data structures, programs and algorithm analysis, and the effects of the choices. …”
Get full text
Get full text
Get full text
Teaching Resource
