Search Results - (( developing access control algorithm ) OR ( java optimization path algorithm ))
Search alternatives:
- developing access »
- java optimization »
- optimization path »
- path algorithm »
-
1
Visdom: Smart guide robot for visually impaired people
Published 2025“…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
4
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
5
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
6
-
7
A Quantum Lightning Search Algorithm-Based Fuzzy Speed Controller for Induction Motor Drive
Published 2023Article -
8
-
9
-
10
-
11
-
12
-
13
A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization
Published 2019“…A high-level granularity access control model needs to be applied to achieve a fine-grained authorization. …”
Get full text
Get full text
Thesis -
14
An optimal LFC in two-area power systems using a meta-heuristic optimization algorithm
Published 2023Article -
15
-
16
-
17
-
18
Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2009“…And we can define the utilization as simply the throughput divided by the access rate. And also all the developments for the congestion control and avoidance algorithms interest about the using of network resources and use the links capacity (utilization). …”
Get full text
Get full text
Article -
19
Face recognition door lock system / Danial Haziq Hakimi Salahuddin
Published 2023“…The system provides a reliable and efficient method of access control while eliminating the need for traditional keys or access cards, making it convenient for users. …”
Get full text
Get full text
Student Project -
20
Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E
Published 2013“…In this research, two algorithms tailored at enhancing the performance of hybrid algorithms in the WiMAX domains have been designed and developed. …”
Get full text
Get full text
Thesis
