Search Results - (( developing users generation algorithm ) OR ( java optimization path algorithm ))
Search alternatives:
- generation algorithm »
- java optimization »
- optimization path »
- developing users »
- users generation »
- path algorithm »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
2
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
3
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Real-time algorithmic music composition application.
Published 2022“…Besides generating music, the developed system includes various functionalities including saving the music into an audio file, editing the generated music, playing music, as well as loading and viewing the music previously generated and saved by the users. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
7
Mobile game application development using evolutionary algorithms
Published 2014“…Since it involves human users, adding Interactive Evolutionary Algorithm (IEA) together with EP has allowed further rules to be generated that are based on the user’s preferences. …”
Get full text
Get full text
Get full text
Thesis -
8
PSAT : a pairwise test data generation tool based on simulated annealing algorithm
Published 2015“…This research is about the research on developing a Pairwise Test Data Generation Tool based on Simulated Annealing (SA) algorithm which named as PSAT. …”
Get full text
Get full text
Undergraduates Project Papers -
9
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…It is noted that active user intervention increases the acceleration of Genetic Algorithm towards an optimal solution. …”
Get full text
Get full text
Thesis -
10
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…The algorithms used in this generator are based on March algorithm. …”
Get full text
Get full text
Thesis -
11
Automatic generation of user-defined test algorithm description file for memory BIST implementation
Published 2022“…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
Get full text
Get full text
Get full text
Article -
12
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Pairwise test suite generator tool based on harmony search algorithm (HS-PTSGT)
Published 2014“…This thesis is about the research on developing a pairwise test suite generator tool based on Harmony Search Algorithm (HS-PTSGT) to generate optimum test suite. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Trajectory planning and simulation for 3d printing process
Published 2022“…The output of slicing algorithm will be used as input of infill generator to generate infill vertices based on the infill density and infill pattern that decided by users. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
T-way testing : a test case generator based on melody search algorithm
Published 2015“…This thesis is research on developing a T-Way Testing : A Test Case Generator Based On Melody Search Algorithm (TTT-MS) to generate optimum final test list. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Eye makeup system using interactive genetic algorithm
Published 2010“…Interaction is required for user to determine the fitness funct ions used in Genetic Algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Development of automated neighborhood pattern sensitive fault syndrome generator for SRAM
Published 2012“…A user-friendly Graphical User Interface (GUI) of ANPSFSG is also developed by using Microsoft Visual Basic software to load the algorithm under test and display the results.…”
Get full text
Get full text
Conference or Workshop Item -
18
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…For instance, various scheduling algorithms which offer several techniques in handling resources to the users have been developed such as Modified Largest Weighted Delay First (MLWDF), Proportional Fairness (PF) and Maximum Rate. …”
Get full text
Get full text
Thesis -
19
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…In addition, dummy queries are generated to protect users from unusual situations. …”
Get full text
Get full text
Get full text
Article -
20
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…In addition, dummy queries are generated to protect users from unusual situations. …”
Get full text
Get full text
Article
