Search Results - (( basic computing path algorithm ) OR ( evolution optimization mead algorithm ))
Search alternatives:
- evolution optimization »
- optimization mead »
- basic computing »
- computing path »
- path algorithm »
- mead algorithm »
-
1
Optimized PID controller of DC-DC buck converter based on archimedes optimization algorithm
Published 2023“…The proposed PID controller, optimized using AOA, is contrasted with PID controllers tuned via alternative algorithms including the hybrid Nelder-Mead method (AEONM), artificial ecosystem-based optimization (AEO), differential evolution (DE), and particle swarm optimizer (PSO). …”
Get full text
Get full text
Get full text
Article -
2
Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman
Published 2020“…It can be concluded that Basic Theta* can produce a shorter path compared to A* but with the price of having a higher computation time. …”
Get full text
Get full text
Thesis -
3
-
4
-
5
Investigating and developing the best method in shortest path for implementing a geographical information system (e-map) for Peninsular Malaysia
Published 2005“…Assessment will be done by calculating the algorithm complexion and runtime using the computer. …”
Get full text
Get full text
Monograph -
6
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…Jump Point Search is one of the path finding algorithm with huge advantage of maintaining zero memory overhead as no preprocessing process involved. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2023Article -
9
Travelling Salesman Problem using Prim Algorithm in High Performance Computing
Published 2007“…This preliminary report emphasizes on the basic terms of the efficient job scheduling algorithm for traveling salesman problem in high performance computing. …”
Get full text
Get full text
Final Year Project -
10
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…Finally, the proposed ASH was tested on two well known benchmark data sets to evaluate its performance and effectiveness. The computational results suggest that the AS approach embedded with heuristic(s) outperforms the pure AS algorithm. …”
Get full text
Get full text
Thesis -
11
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
12
Unconstraint assignment problem : a molecular computing approach
Published 2006“…The proposedapproach basically consists of two phases; encoding phase and computational phase. …”
Get full text
Get full text
Article -
13
-
14
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…It is observed that the APFLC showed convincing performance over the entire simulation of the Pico-satellite. Genetic Algorithm (GA) is a computational model inspired by evaluation. …”
Get full text
Thesis -
15
MOTION TARGET TRACKING OF MOBILE ROBOTS
Published 2015“…The main hardware and has been tested with basic programs based on the algorithms of the said methods. …”
Get full text
Get full text
Final Year Project -
16
The enhanced fault-tolerant AODV routing protocol for Wireless Sensor Network
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
17
SnapShare: AI Trained Mobile App to Share Snaps Automatically
Published 2020Get full text
Get full text
Get full text
Article -
18
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…Multi-functional nodes are the basic unit of WSN for the current era of sensing the environmental changes, communication and computation aptitudes [Villalba et al 2009]. …”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…These applications are basically involve in monitoring of sensitive information such as tracking of enemy movement and patient’s health information. …”
Get full text
Get full text
Get full text
Thesis
