Search Results - (( develop turning protocol algorithm ) OR ( java optimization path algorithm ))
Search alternatives:
- protocol algorithm »
- java optimization »
- optimization path »
- turning protocol »
- path algorithm »
- develop »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
2
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
3
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Enhancing the stability of the improved-LEACH routing protocol for WSNs
Published 2018“…A new protocol is proposed in this paper: Stable Improved Low Energy Adaptive Clustering Hierarchy (SILEACH), which was developed to overcome the flaws of the Improved LEACH protocol. …”
Get full text
Get full text
Get full text
Article -
6
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
7
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…Next, an enhanced version of the proposed Scalable and Efficient Key Management Protocol called extended SEKMP (E-SEKMP) is developed based on SEKMP. …”
Get full text
Get full text
Thesis -
8
-
9
Traffic Control in a Synchronous Transfer Mode Networks
Published 1995“…Thus, much research is needed not just to improve existing technologies, but to seek a fundamentally different approach toward network architectures and protocols. In particular, new bandwidth allocation and call admission control algorithms need to be studied to meet these new challenges. …”
Get full text
Get full text
Thesis
