Search Results - (( interval optimization path algorithm ) OR ( java application matching algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Optimizing optimal path trace back for Smith-Waterman algorithm using structural modelling technique by Saliman, Nur Farah Ain

    Published 2012
    “…The optimizing of optimal path trace back system for Smith-Waterman algorithm using structural modelling techniques are presented in this paper. …”
    Get full text
    Get full text
    Student Project
  2. 2

    Continuous path planning of Kinematically redundant manipulator using Particle Swarm Optimization by Machmudah, A., Parman, S., Baharom, M.B.

    Published 2018
    “…To choose a best solution among many possible solutions, meta-heuristic optimizations, namely, a Genetic Algorithm (GA), a Particle Swarm Optimization (PSO), and a Grey Wolf Optimizer (GWO) will be employed with an optimization objective to minimize a joint angle travelling distance. …”
    Get full text
    Get full text
    Article
  3. 3

    Continuous path planning of Kinematically redundant manipulator using Particle Swarm Optimization by Machmudah, A., Parman, S., Baharom, M.B.

    Published 2018
    “…To choose a best solution among many possible solutions, meta-heuristic optimizations, namely, a Genetic Algorithm (GA), a Particle Swarm Optimization (PSO), and a Grey Wolf Optimizer (GWO) will be employed with an optimization objective to minimize a joint angle travelling distance. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network by Al-Kharasani, Nori Mohammed Abdulkarem

    Published 2020
    “…The proposed Quality of Path QoP metric is incorporated into the modified relay selection algorithm, which improves the efficiency of relay selection mechanism to find optimal path with high link quality. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…The proposed algorithms aim to accelerate the processes of distortion removal and rectification using precomputed combined maps. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13