Search Results - (( developing box path algorithm ) OR ( java implication from algorithm ))
Search alternatives:
- java implication »
- implication from »
- developing box »
- path algorithm »
- from algorithm »
-
1
Repetitive mutations in genetic algorithm for software test data generations
Published 2022“…Genetic Algorithm (GA) has proven to be an important method in generating test data for automatic path coverage testing. …”
Get full text
Get full text
Thesis -
2
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…The purpose of this study is two folds such as the development of a statistically valid path model which considered the possible non-linear paths, mediators, and binary endogenous feature of CVDs status. …”
Get full text
Get full text
Thesis -
3
Design of an intelligent robotic donationbox a case study
Published 2011“…The design and development of an Intelligent Robotic Donation Box (IRDB) system as a typical final year project in Mechatronics engineering is presented in this paper. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
Get full text
Get full text
Get full text
Get full text
Article -
5
Reconfigurable Stewart Platform for Spiral Contours
Published 2011“…The results obtained are to be validated for singularity-free path planning and attempt has to be made to estimate the computational efficiency of the algorithm. …”
Get full text
Get full text
Get full text
Citation Index Journal -
6
-
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
8
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis
