Search Results - (( java application during algorithm ) OR ( knowledge implementation path algorithm ))
Search alternatives:
- knowledge implementation »
- implementation path »
- application during »
- java application »
- during algorithm »
- path algorithm »
-
1
An experiment on the performance of shortest path algorithm
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…This algorithm has been tested and implemented successfully via a dual beam optical scanning system.…”
Get full text
Get full text
Thesis -
3
Global Mobile Robot Path Planning using Laser Simulator
Published 2017“…From the results, the laser simulator has advantages in computational time and low collision possibility in comparison with A* algorithm while the path cost of laser simulator is always greater than path cost of A* algorithm.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Test case minimization applying firefly algorithm
Published 2018Get full text
Get full text
Get full text
Article -
5
Path Following Using A Learning Neural Network
Published 2004“…The implemented neural controller will in turn minimize a performance index, which includes the lateral and attitude angle errors ofvehicle models with respect to the paths. …”
Get full text
Get full text
Final Year Project -
6
A test case generation framework based on UML statechart diagram
Published 2018“…They are relation table, relation graph, consistency checking, test path minimization, test path prioritization, path pruning, test path generation, and test case generation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2006“…This algorithm has been tested and implemented successfully via a dual-beam optical scanning module. © 2006 Asian Network for Scientific Information.…”
Get full text
Get full text
Get full text
Article -
8
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2023“…This algorithm has been tested and implemented successfully via a dual-beam optical scanning module. � 2006 Asian Network for Scientific Information.…”
Article -
9
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2023“…This algorithm has been tested and implemented successfully via a dual-beam optical scanning module. � 2006 Asian Network for Scientific Information.…”
Article -
10
Determining Intermediary Closely Related Languages to Find a Mediator for Intertribal Conflict Resolution
Published 2022“…To calculate the first criteria, we implemented the Yenâ��s K algorithm to calculate the shortest path between target languages and return the path via the intermediary languages. …”
Get full text
Get full text
Article -
11
Investigation On Optical Fibre Configurations For Process Tomography
Published 2002“…Linear back projection (LBP) algorithm is used to reconstruct the image. A modified reconstruction algorithm combining LBP and a priori knowledge is outlined. …”
Get full text
Get full text
Get full text
Article -
12
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
13
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…Machine learning algorithms are iteration based algorithms, as the new knowledge is based on the previous predicted /calculated knowledge which helps to decrease errors in order to increase efficiency. …”
Get full text
Get full text
Conference or Workshop Item -
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Ontology based approach to Fuzzy student model design
Published 2014“…Moreover, Ontology is considered as a key component for managing knowledge in a particular domain, and we intend to use its methodology as a tool to examine and manage the student’s knowledge state, competency and skills.…”
Get full text
Get full text
Article -
16
-
17
-
18
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…A suitable query routing algorithm was developed and tested with the DSD architecture.…”
Get full text
Get full text
Thesis -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
