Search Results - (( developing block share algorithm ) OR ( java optimization path algorithm ))
Search alternatives:
- java optimization »
- optimization path »
- developing block »
- share algorithm »
- path algorithm »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
2
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
3
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Parallel block methods for solving higher order ordinary differential equations directly
Published 1999“…A new parallel algorithm for solving systems of ODEs using variable step size and order is also developed. …”
Get full text
Get full text
Thesis -
6
Parallel direct integration variable step block method for solving large system of higher order ordinary differential equations.
Published 2009“…The algorithm of the method was developed in C language and the parallel computation was done on a parallel shared memory environment. …”
Get full text
Get full text
Article -
7
Parallel Execution of Runge-Kutta Methods for Solving Ordinary Differential Equations
Published 2004“…The C programming of the methods employed are run on a shared memory Sequent SE30 parallel computer. All the numerical results are given to illustrate the algorithms developed for the cases that we were tested. …”
Get full text
Get full text
Thesis -
8
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
Published 2018“…For data security, block ciphers like advanced encryption standard are needed. …”
Get full text
Get full text
Get full text
Article -
9
Development of an ARM-based Application System
Published 2012“…It is hoped that the development process shared in this paper may be benefitted for researchers who wishes to start developing an ARM-based system for further study or other purpose in one way or another.…”
Get full text
Get full text
Conference or Workshop Item -
10
Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau
Published 2020“…Production line commonly used algorithm such as shortest processing time (SPT), longest processing time (LPT), cycle time optimization and centre of gravity (CoG) algorithm are coded in this system which enables the production schedule and sequence to be optimized. …”
Get full text
Get full text
Get full text
Thesis -
11
Development of arm-based application system
Published 2012“…It is hoped that the development process shared in this paper may be benefitted for researchers who wishes to start developing an ARM-based system for further study or other purpose in one way or another.…”
Get full text
Get full text
Conference or Workshop Item -
12
Identifying the influential spreaders in multilayer interactions of online social networks
Published 2016“…The results analysis concluded that improving the accuracy of influential spreaders identification in OSNs is not only by improving identification algorithms but also by developing a network topology that represents the information diffusion well. …”
Get full text
Get full text
Article -
13
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…In the second step the algorithm follows a teeming search. QuickFlood compared with blocking expanding ring search decreased redundant messages by 70%, increased two-time success rate and decreased latency by 30%. …”
Get full text
Get full text
Thesis -
14
A new priority rule cloud scheduling technique that utilizes gaps to increase the efficiency of jobs distribution
Published 2023“…To address this issue, the main objective of this research is to improve the existing PR cloud schedulers by developing a new dynamic scheduling algorithm by manipulating the gaps in the cloud job schedule. …”
Get full text
Get full text
Thesis -
15
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
16
Development of autonomous vehicle for road marks painting
Published 2017Get full text
Get full text
Research Report -
17
Healthcare-Chain: Blockchain-Enabled Decentralized Trustworthy System in Healthcare Management Industry 4.0 with Cyber Safeguard
Published 2023“…This scheme revealed the optimal performance in terms of mining health data size, average response time, transaction latency, and throughput for secured block transactions in blockchain networks.…”
Get full text
Get full text
Get full text
Article -
18
Blockchain-enabled cybersecurity framework for healthcare domain
Published 2025“…It also formulates the algorithms for the development of the proposed blockchain-enabled healthcare framework and evaluates its performance in data transaction management through simulation. …”
Get full text
Get full text
Thesis -
19
Constant lock circuit for DC micro-grid system
Published 2017“…For all the above, there is a need for a new interface block control to deal with these problems. For this, an algorithm system strategy for utilizing a Constant Lock Circuit in the DC micro-grid aims at maintaining a constant DC link voltage at the desired constant value of 24v to ensure high stability voltage and current without any ripple. …”
Get full text
Get full text
Get full text
Thesis -
20
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…In this thesis, a parallel encryption system for the protection of sensitive data stored inside Android-based mobile devices is developed and successfully implemented. To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
Get full text
Get full text
Get full text
Thesis
