Search Results - (( java implementation a algorithm ) OR ( using complex path algorithm ))
Search alternatives:
- java implementation »
- implementation a »
- path algorithm »
- using complex »
- complex path »
- a algorithm »
-
1
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…This research aims to assist the evacuees to find the shortest path in a high rise building using a shortest path algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
3
Development of an improved Jellyfish Search (JS) algorithm for solving the optimal path problem of multi-robot collaborative multi-tasking in complex vertical farms
Published 2025“…The VFSMRCTP model is solved using the TLDW-JS algorithm and a number of comparison algorithms in order to analyze the algorithm’s performance. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Wheeled Mobile Robot Path Control in a Complex Trajectory using HybridMethods
Published 2015Get full text
Get full text
Get full text
Book Chapter -
6
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
7
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
8
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…In order to achieve the less test generation complexity, design-for-testability (DFT) techniques are used which causes untestable paths to be testable. …”
Get full text
Get full text
Conference or Workshop Item -
9
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
10
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
11
An improved narrowband active noise control system without secondary path modelling based on the time domain
Published 2019“…The acoustic noise generated is further compounded by using secondary path identification which makes the system complex. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing
Published 2007“…It has been shown that the performance of a graph-based shortest path algorithm can severely be affected by the performance of its priority queue. …”
Get full text
Get full text
Get full text
Thesis -
13
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…However, this assumption may lead to inaccurate secondary path model. In this work, the modelling of acoustic path using FIR filters is incorporated for both algorithms for Wiener-Hammerstein structure. …”
Get full text
Get full text
Thesis -
14
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…In order to achieve the less test generation complexity, design-for-testability (DFT) techniques are used which causes untestable paths to be testable. …”
Get full text
Get full text
Article -
15
Adaptive rapidly-exploring-random-tree-star (Rrt*) -Smart: algorithm characteristics and behavior analysis in complex environments
Published 2013“…Rapidly Exploring Random Trees (RRT) are regarded as one of the most efficient tools for planning feasible paths for mobile robots in complex obstacle cluttered environments. …”
Get full text
Get full text
Get full text
Article -
16
Development of low power viterbi decoder on complex programmable logic device platform
Published 2018“…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
Get full text
Get full text
Get full text
Thesis -
17
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
Get full text
Get full text
Thesis -
18
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…However, the conversion of a complex form of ML algorithms into a simple statistical model is the prime concern. …”
Get full text
Get full text
Thesis -
19
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2021“…This paper develops a path planning algorithm of hyper-redundant manipulators to achieve a cyclic property. …”
Get full text
Get full text
Get full text
Article -
20
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item
