Search Results - (( developers exploring concerns algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developers exploring »
- exploring concerns »
- concerns algorithm »
- implication based »
- java implication »
-
1
Efficient terrain coverage for deploying wireless sensor nodes on multi-robot system
Published 2016“…One of solution for this problem is using mobile robots with concern on exploration algorithm for mobile robot. …”
Get full text
Get full text
Get full text
Article -
2
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
Published 2015“…One of the solutions to this problem is by using mobile robots with concern on exploration algorithm for mobile robot. …”
Get full text
Get full text
Thesis -
3
-
4
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…Moreover, the inherent limitations of drones, namely constraints on energy consumption, data storage capacity, and processing power, present formidable obstacles in developing collision avoidance algorithms. This review paper explores the challenges of ensuring safe drone operations, focusing on collision avoidance. …”
Get full text
Get full text
Get full text
Article -
5
Mobile robot path optimization algorithm using vector calculus and mapping of 2 dimensional space
Published 2015“…A simulated robot in a simulated environment is used to test the algorithm that is to be developed. The simulated robot is equipped with a sonar sensor and several infrared sensors on its chassis. …”
Get full text
Get full text
Get full text
Article -
6
Improved Bat Algorithm for faster convergence in solving optimisation problem
Published 2021“…Besides that, IBA was found comparable with existing variants of BA such as the IBA developed from the previous researcher in the year 2013 and the Hybrid Self-Adaptive Bat Algorithm (HSABA) developed in the year 2014. …”
Get full text
Get full text
Get full text
Thesis -
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
8
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Robotic path planning using rapidly-exploring random trees
Published 2013“…This study concerns the implementation of Rapidly-Exploring Random Trees (RRTs) algorithm for an autonomous robot path planning. …”
Get full text
Get full text
Get full text
Thesis -
11
Multi-Agent cubature Kalman optimizer: A novel metaheuristic algorithm for solving numerical optimization problems
Published 2024“…CTT can use small values for parameters P(0), Q, and R, so CKF was developed to overcome KF and other estimation algorithms. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Artificial intelligence (AI) and its application in architecture design: a thematic review
Published 2025“…It has broad implications across various industries, sparking extensive debates on AI’s potential, a concern particularly resonant within the architectural design industry. …”
Get full text
Get full text
Get full text
Article -
14
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
Published 2018“…In line with the emerging field called Search based Software Engineering, many recently developed t-way strategies have adopted meta-heuristic algorithms as the basis of their implementations such as Simulated Annealing, Genetic Algorithm, Ant Colony Optimization Algorithm, Particle Swarm Optimization, Harmony Search and Cuckoo Search, owing their superior performance in term of test size reduction as compared to general computational based strategies, such as General t-way, Test Vector Generator, In Parameter Order General, Jenny, and Automatic Efficient Test Generator. …”
Get full text
Get full text
Thesis -
15
Sentiment analysis regarding childcare issues using Naive Bayes Algorithm / Alis Farhana Zulkipeli
Published 2025“…However, the lack of comprehensive methodologies poses challenges for policymakers, childcare providers, and researchers in understanding public concerns and developing effective interventions. To address this, a dataset of 1,079 tweets from X (formerly Twitter) is analyzed. …”
Get full text
Get full text
Thesis -
16
Exploring the effect of shape parameters on font design using rational quadratic trigonometric curves
Published 2025“…While AI integration enhances learning efficiency and accessibility, ethical concerns such as data privacy, algorithmic bias, and academic integrity remain critical challenges. …”
Get full text
Get full text
Get full text
Article -
17
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023“…In terms of hardware implementation, a microcontroller is chose, and a testing environment is established to explore and enhances security measures. This thesis outlines the architectural model of the smart locking system, the design of the face recognition algorithm, and the development of face recognition reader using the Raspberry Pi 3 model B microcontroller. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…Many AI-based strategies have been developed, such as Ant Colony, Simulated Annealing, Genetic Algorithm, and Tabu Search. …”
Get full text
Get full text
Thesis -
19
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…Clustering in WSNs is a reliable method of effectively transferring data within the network through routing. Thus, developing an effective routing algorithm to optimize network functionality is a big concern. …”
Article -
20
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis
