Search Results - (( developing mobile evolutionary algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- evolutionary »
-
1
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
Get full text
Get full text
Monograph -
2
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
3
-
4
Mobile game application development using evolutionary algorithms
Published 2014“…Hence it has opened up a whole new market with its mass among users and attracted a large number of smartphone application developers. Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
Get full text
Get full text
Get full text
Thesis -
5
Automatic generation of mobile content in entertainment applications using evolutionary computing
Published 2010“…Since it involves human users, adding Interactive Evolutionary Algorithm together with Evolutionary Programming has allowed further rules to be generated that are based on the user's preferences. …”
Get full text
Get full text
Research Report -
6
-
7
An extended adaptive mechanism of evolutionary based channel assignment via reinforcement
Published 2012“…Initial channel assignment parameters are obtained using self-learning scheme and evolutionary algorithms is used to fine-tune the estimated parameters from reinforcement learning algorithm to optimise the channel assignment problem in wireless mobile networks. …”
Get full text
Get full text
Research Report -
8
Automatic design, optimization and In-Situ Fabrication of Heterogeneous Swarm Robot bodies using 3-D printing and multi-objective evolutionary algorithms
Published 2012“…Over the last decade, various mobile robots have been developed and widely used in myriad sectors. …”
Get full text
Get full text
Research Report -
9
-
10
Overview of Evolutionary Algorithms and Neural Networks for Modern Mobile Communication
Published 2024journal::journal article -
11
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
12
-
13
Improvement and application of particle swarm optimization algorithm
Published 2025“…An ideal assignment technique assigns new duties to each functioning robot, followed by evolutionary algorithms and Particle Swarm Optimization (PSO) to design pathways to the reconfigured positions. …”
Get full text
Get full text
Article -
14
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
15
Design, optimization and fabrication of a climbing six articulated-wheeled robot using artificial evolution and 3D printing
Published 2015“…Over the last decade, various mobile robots have been developed and widely used in myriad sectors. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017Subjects: Get full text
Get full text
Thesis -
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…A static analysis technique with machine learning classifier is developed from the permission features noted in the Android mobile device for detecting the malware applications. …”
Get full text
Get full text
Article
