Search Results - (( basic selection path algorithm ) OR ( java application towards algorithm ))
Search alternatives:
- towards algorithm »
- java application »
- basic selection »
- selection path »
- path algorithm »
-
1
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…Jump Point Search is one of the path finding algorithm with huge advantage of maintaining zero memory overhead as no preprocessing process involved. …”
Get full text
Get full text
Get full text
Thesis -
2
Scheduling of batch process plant / Abdul Aziz Abu Bakar
Published 1995“…This research work is devoted to software development of scheduling and control algorithm of batch process plant using shortest path method developed by Dijkstra and K* shortest path method developed by Jin Y. …”
Get full text
Get full text
Student Project -
3
Network analysis for GPS UTMnav system: preliminary stage
Published 2008“…Each algorithm was reviewed and a simulation test was conducted to evaluate the selected algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
5
Network game (Literati) / Chung Mei Kuen
Published 2003“…This thesis steps towards developing a networked game, Literati game system that supporting two players at one time. …”
Get full text
Get full text
Thesis -
6
Automated time series forecasting
Published 2011Get full text
Get full text
Get full text
Monograph -
7
MOTION TARGET TRACKING OF MOBILE ROBOTS
Published 2015“…The main hardware and has been tested with basic programs based on the algorithms of the said methods. …”
Get full text
Get full text
Final Year Project -
8
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
-
11
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…In order to achieve this, different sets of trust information including QoS, OSNs and ant colony system (ACS) algorithm are proposed to improve the selection of trustworthy node. …”
Get full text
Get full text
Get full text
Thesis -
12
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…This survey paper is focused on the discussion of best optimal path routing algorithms in wireless sensor networks by using supervised machine learning approaches. …”
Get full text
Get full text
Conference or Workshop Item -
13
Enhanced Mobility Solution In Mobile Ipv6 Network
Published 2008“…A framework based on policy based routing protocol was proposed for handling both the inbound and the outbound traffic on a mobile network, under specified policies which consider packet characteristics, current network situation and user preferences. The interface selection algorithm was based on NEMO implementation structure using a technique of mutihoming which was extended to MIPv6 concepts The outcome of this research work are: a designed policy protocol for policy messages communication between the Mobile Router and the Home Agent, the framework is simulated using Network Simulator (NS2) with an extension of mobiwan, the result shows the end to end delay, average end to end delay, overhead, optimal routing path, average inter-packet latency and throughput of the developed system. …”
Get full text
Get full text
Thesis -
14
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
15
Network monopoly / Tan Kean Yeap
Published 2002“…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
Get full text
Get full text
Thesis -
16
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…Agent technology could provide personalization and intelligent assistance to give a more human-centered approach towards users in knowledge sharing participation. …”
Get full text
Get full text
Thesis -
18
An integrated model of automated elementary programming feedback using assisted and recommendation approach
Published 2017“…This enhancement was evaluated on three ordinal datasets on different application domain covering 67 Java programs, 92 students’ marks on computer architecture subject and 456 EUFA’s football club coefficient ranking list. …”
Get full text
Get full text
Get full text
Thesis
