Search Results - (( java implementation _ algorithm ) OR ( using virtual path algorithm ))
Search alternatives:
- java implementation »
- path algorithm »
- using virtual »
- virtual path »
-
1
Optimal path planning algorithms in virtual environments
Published 2006“…Path planning algorithm is a common algorithm applied in many fields of research specifically in robotic, games and Virtual Environments (VEs). …”
Get full text
Get full text
Thesis -
2
An efficient virtual tour : a merging of path planning and optimization
Published 2004“…This paper describes the result of a research project aimed to integrate a path-planning optimization-algorithm and produce an efficient tour in a virtual environment. …”
Get full text
Get full text
Article -
3
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…The second approach is the modification of heuristic computation using original A* and modified Bresenham. Bresenham Line Algorithm is a line generation algorithm using integer arithmetic where the points (x1, y1) and (x2, y2) are assumed not equal and integer valued. …”
Get full text
Get full text
Get full text
Thesis -
4
Optimal path planning algorithm for swarm robots using bat algorithm with mutation (bam)
Published 2022“…The current research in robot navigation is to implement an obstacle avoidance algorithm to a single mobile robot to realize the path planning of a mobile robot. …”
Get full text
Get full text
Undergraduates Project Papers -
5
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…Collision detection is crucial in virtual manufacturing applications such as virtual prototyping, virtual assembly and virtual robot path planning. …”
Get full text
Get full text
Thesis -
6
New algorithm for autonomous dynamic path planning in real-time intelligent robot car
Published 2017“…Different algorithms have been used to address this problem by considering the optimal path with minimum cost; however, these algorithms did not consider the execution time to find such path. …”
Get full text
Get full text
Get full text
Article -
7
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
The impact of clustering on the average path length in wireless sensor networks
Published 2015“…Clustering algorithms have been widely used in wireless sensor networks for virtual backbone construction. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Virtual force field algorithm for a behaviour-based autonomous robot in unknown environments
Published 2011“…The path-planning algorithm is based on the VFF and BF methods. …”
Get full text
Get full text
Get full text
Article -
10
Application of the Bees Algorithm to find optimal drill path sequence
Published 2024Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
12
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
13
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
14
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
15
Autonomous mobile robot: Path planning using backward chaining
Published 2008“…Obstacle avoidance and path planning algorithms has been tested using the completed design of AMR body. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
17
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
18
Advanced computational geometry for proximity queries of convex polyhedras
Published 2009Get full text
Working Paper -
19
-
20
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis
