Search Results - (( initial navigation using algorithm ) OR ( java implementation model algorithm ))
Search alternatives:
- implementation model »
- java implementation »
- initial navigation »
- navigation using »
- using algorithm »
- model algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
2
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
3
Implementation of an autonomous mobile robot navigation algorithm using C language
Published 2009“…After that, implement the navigation algorithm on the mobile robot and without using the external sensor for navigation of the mobile robot to reach the specified point. …”
Get full text
Get full text
Final Year Project -
4
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
5
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
6
GPS boundary navigation of DrosoBots using MATLAB simulation
Published 2010“…This paper presents the initial developmental stage of mini Autonomous Surface Vehicles (ASVs), which is to define the algorithm of boundary navigation for each of the ASV via programming and sensor networks. …”
Get full text
Get full text
Proceeding Paper -
7
AN IMPLEMENTATION OF BEHAVIOUR-BASED NAVIGATION ROBOT USING FUZZY LOGIC ON AN INDOOR MOBILE ROBOT
Published 2019“…Currently, the fuzzy logic algorithm with a wall following navigation has been implemented on a two-wheel mobile robot and have begun initial testing…”
Get full text
Get full text
Final Year Project -
8
Trajectory-based analysis in nonlinear navigation using extended kalman filter with different covariance matrix acquisition methods
Published 2025“…One of the requirements in implementing EKF is to have a reliable covariance value that acts as an initializer before performing any navigation. Previous studies tend to ignore the importance of initial covariances by only assuming the value as an identity matrix, using existing datasets or using random values rather than obtaining it technically. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
10
A Navigation Strategy for Swarm Robotics Based on Bat Algorithm Optimization Technique
Published 2018“…BA as a nature inspired algorithm is used in the system to determine current location and search for future position of each robots inspired by echolocation behavior of microbats. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
13
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
14
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
15
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
Development of real-time navigation system by using pure pursuit guidance for unmanned surface vehicle
Published 2024“…From 40s to 70s, the USV followed the target, reaching its last known position at 75s, showing how the tracking algorithm effectively guides the USV using Pure Pursuit guidance. …”
Get full text
Get full text
Thesis -
17
Arfict: Indoor navigation mobile application using augmented reality (AR) for FICT
Published 2025“…Navigation paths are optimised using the A* algorithm, while ARCore integrates sensor data from the device’s gyroscope and accelerometer to enhance tracking accuracy. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
19
Visualizing pathway on 3D maps for an interactive user navigation in mobile devices
Published 2019“…This technique provides visualization of 3D maps in virtual 3D workspace environments which assists a user to navigate to a target location. The Bi-A* path-finding algorithm was used for establishing dynamic target location in Voronoi diagram/Delaunay triangulation. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
20
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item
