Search Results - (( developing interactive path algorithm ) OR ( java equation using algorithm ))

Refine Results
  1. 1

    Robotic path planning using rapidly-exploring random trees by Sherwani, Fahad

    Published 2013
    “…This study concerns the implementation of Rapidly-Exploring Random Trees (RRTs) algorithm for an autonomous robot path planning. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…This research aims to develop a novel path prediction system which could keep track of the traveler during temporary shortage of actual positioning data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning methods for autonomous vehicles at intersections: A review by Vinayak, Akhil, Muhammad Aizzat, Zakaria, Younus, Maryam, Mohamad Heerwan, Peeie, Muhammad Izhar, Ishak

    Published 2026
    “…Overall, this review aims to support the development of AV path planning, ultimately contributing to safer and more efficient autonomous systems in urban environments.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Theoretical study of elliptic drum of vertical spindle cotton picker by Ravutov, Shavkat, Rakhimov, Abdumalik, Ibragimov, Gafurjan

    Published 2025
    “…An analytical expression is obtained, and a convenient calculation algorithm is developed to automate the investigation of the influence of the dimensions of drum mechanism parts onthe directional path shape and its dimensions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A microscopic swarm model simulation and fractal approach towards swarm agent behaviour by Widyarto, Setyawan, Abd. Latiff, Muhammad Shafie

    Published 2006
    “…The collision avoidance algorithm is influenced by existing algorithm flock which uses the steering behaviour to animate birds. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11

    Arfict: Indoor navigation mobile application using augmented reality (AR) for FICT by Lee, Chorng Huah

    Published 2025
    “…Hence, the ARFICT project aims to develop an Augmented Reality (AR)-based indoor navigation system for the FICT building at UTAR, providing a real-time, interactive navigation experience that enhances wayfinding in complex indoor environments. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Development of least square adjustment application for traversing / Harith Fadhillah Soeb by Soeb, Harith Fadhillah

    Published 2019
    “…In addition, the development stage started by perform calculation process using MATLAB software. Next, the algorithm for calculation process was generated using the Eclipse application that uses Java programming language. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An Energy-Efficient Cross-Layer approach for cloud wireless green communications by Sadiq, Ali Safa, Almohammad, Turfah Zeyad, Rabiatul Adawiah, Muhamed Khadri, Ahmed, Abdulghani Ali, Lloret, Jaime

    Published 2017
    “…The main challenge in WSN is to develop an energy efficient algorithm to minimize energy consumption during transmitting information from deployed sensors up to the cloud resources. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    SnapShare: AI Trained Mobile App to Share Snaps Automatically by Waqas, Ahmad, Gilal, Abdul Rehman, Khan, Adil, Omar, Mazni, Chohan, Murk, Gilal, Ruqaya

    Published 2020
    “…Unfortunately, these developed apps require user’s interaction to identify individuals in the photo. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Design of a swimming small soft robot for underwater applications by Chin, Chavez Zhee Ming

    Published 2024
    “…By utilizing flexible materials like Ecoflex, PVC sheets, and plastic films, the study successfully developed a soft robot capable of actuating in water. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19
  20. 20

    Enhanced recognition methods for text and slider CAPTCHA vulnerability assessment by Xing, Wan

    Published 2025
    “…By comparing them with the benchmark models in terms of recognition accuracy, precision, computational complexity, storage space, and other metrics, the superiority of our proposed algorithm is proved. Furthermore, we have delineated the path for subsequent study and enhancement.…”
    Get full text
    Get full text
    Thesis