Search Results - (( intelligence system vs algorithm ) OR ( intelligence p path algorithm ))
Search alternatives:
- intelligence system »
- intelligence p »
- path algorithm »
- vs algorithm »
- system vs »
- p path »
-
1
-
2
-
3
-
4
A novel Bezier curve control point search algorithm for autonomous navigation using N-order polynomial search with boundary conditions
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Advanced computational geometry for proximity queries of convex polyhedras
Published 2009Get full text
Working Paper -
6
-
7
-
8
Classroom finder system with student availability, space and time constraint
Published 2024“…The primary focus of the system is on facilitating efficient and conflict-free room assignments while considering various constraints and requirements by exploring the suitable Artificial Intelligence approaches and scheduling algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
-
10
-
11
Evaluating Adan vs. Adam: an analysis of optimizer performance in deep learning
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…Without treating the power system to be lossless, the tracing results are based on actual system condition; which means that they are consistent. …”
Get full text
Get full text
Thesis -
13
-
14
Camera coverage prioritization to support security monitoring
Published 2017Get full text
Get full text
Article -
15
Design And Development Of Collision Avoidance Strategy For Differential Drive Mobile Robot
Published 2018“…In order to evaluate the performance of the proposed methods, a MATLAB Graphical User Interface (GUI) is created to plot the targeted and real path of the robot. In this work, it is shown that both algorithms provide good collision avoidance strategy with a maximum error of only 5cm.…”
Get full text
Get full text
Monograph -
16
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…Also, the volume of P2P traffic is on the rise. P2P and DSD applications function by forming an overlay on top of the existing IP layer (underlay layer). …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…The Weakest Path (WP), Mean Vulnerabilities on Path (MVoP), and Number of Vulnerabilities (NV) are three metrics introduced in this thesis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Dynamic role engine and formation control for cooperating agents
Published 2009Get full text
Working Paper
