Search Results - (( data detection path algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The existing infeasible path detection methods are restricted to extended finite state machine (EFSM) models with integer data type only. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, Ateeq U. R., Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, A.-U.-R., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
    Get full text
    Get full text
    Article
  6. 6

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
    Get full text
    Thesis
  8. 8
  9. 9

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Energy-Aware Routing Hole Detection Algorithm in the Hierarchical Wireless Sensor Network by Najm Us, Sama, Kartinah, Zen, Atiq Ur, Rahman, Aziz Ud, Din

    Published 2019
    “…In this paper a novel energy efficient routing hole detection (EEHD) algorithm is presented, on the detection of routing hole, the periodic re-clustering is performed to avoid the long detour path. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi by Nur Fadzilah, Mohamad Radzi

    Published 2013
    “…Then, a collision detection algorithm is developed to calculate the potential of collision in future. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Novel algorithm for mobile robot path planning in constrained environment by Muhammad, Aisha, Ali, Mohammed A. H., Turaev, Sherzod, Shanono, Ibrahim Haruna, Hujainah, Fadhl, Mohd Zubir, Mohd Nashrul, Faiz, Muhammad Khairi, Mohd Faizal, Erma Rahayu, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2021
    “…This paper presents a development of a novel path planning algorithm, called Generalized Laser simulator (GLS), for solving the mobile robot path planning problem in a two-dimensional map with the presence of constraints. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Path Planning and Control of Mobile Robot in Road Environments using Sensor Fusion and Active Force Control by Ali, Mohammed A. H., Mailah, Musa

    Published 2018
    “…The sensor fusion algorithm is used to remove noises and uncertainties from sensors' data and provide optimum measurements for path planning. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Novel algorithm for mobile robot path planning in constrained environment by Aisha, Muhammad, Ali, Mohammed A. H., Turaev, Sherzod, Shanono, Ibrahim Haruna, Hujainah, Fadhl, Mohd Nashrul, Mohd Zubir, Muhammad Khairi Faiz, ., Erma Rahayu, Mohd Faizal, Abdulghafor, Rawad

    Published 2022
    “…This paper presents a development of a novel path planning algorithm, called Generalized Laser simulator (GLS), for solving the mobile robot path planning problem in a two-dimensional map with the presence of constraints. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Novel algorithm for mobile robot path planning in constrained environment by Muhammad, Aisha, Ali, Mohammed A. H., Turaev, Sherzod, Shanono, Ibrahim Haruna, Hujainah, Fadhl, Mohd Nashrul, Mohd Zubir, Muhammad Khairi, Faiz, Erma Rahayu, Mohd Faizal, Abdulghafor, Rawad

    Published 2022
    “…This paper presents a development of a novel path planning algorithm, called Generalized Laser simulator (GLS), for solving the mobile robot path planning problem in a two-dimensional map with the presence of constraints. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…A routing algorithm has been developed to create a routing path between all transmission towers in the image, which helps identify the power line path. …”
    text::Thesis
  19. 19

    Vision aided path planning for mobile robot by Rashidan, M. Ariff, Mohd Mustafah, Yasir, Abdul Hamid, Syamsul Bahrin, Y. A. M, Shawgi, Alang Md Rashid, Nahrul Khair

    Published 2014
    “…The paper reveals the accounts from a historical overview and provides a study on how to develop a single vision system for a mobile robot, which implements an obstacle avoidance algorithm, detecting the objects by the colour. Also, we aim at highlighting and analyzing the use of single vision cameras such as webcam in providing data and useful information required for navigation purposes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET by Hemalatha, S., Kshirsagar, P.R., Manoharan, H., Vasantha Gowri, N., Vani, A., Qaiyum, S., Vijayakumar, P., Tirth, V., Haleem, S.L.A., Chakrabarti, P., Teressa, D.M.

    Published 2022
    “…Lower trust level node is selfish node and they are detected and ignored from path. It increases the lifespan of network and throughput and minimizes the end to end delay and energy consumption. …”
    Get full text
    Get full text
    Article