Search Results - (( java data prevention algorithm ) OR ( basic computing path algorithm ))
Search alternatives:
- prevention algorithm »
- data prevention »
- basic computing »
- computing path »
- path algorithm »
- java »
-
1
Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman
Published 2020“…It can be concluded that Basic Theta* can produce a shorter path compared to A* but with the price of having a higher computation time. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
Investigating and developing the best method in shortest path for implementing a geographical information system (e-map) for Peninsular Malaysia
Published 2005“…Assessment will be done by calculating the algorithm complexion and runtime using the computer. …”
Get full text
Get full text
Monograph -
5
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…Jump Point Search is one of the path finding algorithm with huge advantage of maintaining zero memory overhead as no preprocessing process involved. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2023Article -
8
Travelling Salesman Problem using Prim Algorithm in High Performance Computing
Published 2007“…This preliminary report emphasizes on the basic terms of the efficient job scheduling algorithm for traveling salesman problem in high performance computing. …”
Get full text
Get full text
Final Year Project -
9
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
10
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…Finally, the proposed ASH was tested on two well known benchmark data sets to evaluate its performance and effectiveness. The computational results suggest that the AS approach embedded with heuristic(s) outperforms the pure AS algorithm. …”
Get full text
Get full text
Thesis -
11
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
12
Unconstraint assignment problem : a molecular computing approach
Published 2006“…The proposedapproach basically consists of two phases; encoding phase and computational phase. …”
Get full text
Get full text
Article -
13
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
Get full text
Get full text
Thesis -
14
-
15
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Machine Learning is one of the ways as a preventive method by applying the data collected from the clogging experiment in the vibration lab to build up a machine learning model for classification of flow blockage levels in the centrifugal pump. …”
Get full text
Get full text
Monograph -
16
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…It is observed that the APFLC showed convincing performance over the entire simulation of the Pico-satellite. Genetic Algorithm (GA) is a computational model inspired by evaluation. …”
Get full text
Thesis -
17
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…It is a code with double shield protection that prevents unauthorized extraction or damaging the remote database in the server side due to malicious SQL injection. …”
Get full text
Get full text
Get full text
Article -
18
MOTION TARGET TRACKING OF MOBILE ROBOTS
Published 2015“…The main hardware and has been tested with basic programs based on the algorithms of the said methods. …”
Get full text
Get full text
Final Year Project -
19
The enhanced fault-tolerant AODV routing protocol for Wireless Sensor Network
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
20
SnapShare: AI Trained Mobile App to Share Snaps Automatically
Published 2020Get full text
Get full text
Get full text
Article
