Search Results - (( java implementation level algorithm ) OR ( using second path algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- level algorithm »
- path algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Modelling of multi-robot system for search and rescue
Published 2023“…The simulations conducted using MATLAB demonstrate the superiority of the MPSO algorithm over the PSO algorithm in terms of average path length and execution time of all robots in all three proposed scenarios: 16 meter shorter and 7.1 seconds faster in the first scenario, 17.89 meters shorter and 6.14 seconds faster in scenario 2, and 6.18 meters shorter and 8.47 seconds faster in scenario 3. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Optimizing optimal path trace back for Smith-Waterman algorithm using structural modelling technique
Published 2012“…Therefore, the second design is the best approach in optimizing the optimal path trace back for Smith Waterman algorithm. …”
Get full text
Get full text
Student Project -
4
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
5
A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments
Published 2013“…These algorithms generate paths using random numbers and perform efficiently in guiding the robot in known environments. …”
Get full text
Get full text
Thesis -
6
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
7
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…However, this assumption may lead to inaccurate secondary path model. In this work, the modelling of acoustic path using FIR filters is incorporated for both algorithms for Wiener-Hammerstein structure. …”
Get full text
Get full text
Thesis -
8
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…The algorithm which consider the error value, e to increment pixels is the crucial part of the line generation applies the same concept in the second approach, where the error value, e is used as indicator to determine the heuristic cost of the path. …”
Get full text
Get full text
Get full text
Thesis -
9
FINDING SHORTEST PATH FOR DYNAMIC PUTTING PROBLEM USING ANT COLONY OPTIMISATION
Published 2005“…Besides, this thesis also aimed to compare both algorithms used in the system, based on their speed to generate the shortest path. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques
Published 2014“…Second, both the constructive procedure (CP) and the complementary procedure (CCP) heuristic algorithms computed the optimization considering only the execution path that has been predicted by the runtime path prediction method for criteria selection, eight QoS characteristics are suggested after investigating related works on the area of web service and web service composition. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Modification of dijkstra's algorithm for safest and shortest path during emergency evacuation
Published 2015“…Therefore, this paper presents the methodology used for the modification of Dijkstra's algorithm to find the safest and shortest path. …”
Get full text
Get full text
Get full text
Article -
12
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
13
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
14
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Modeling dynamic weight for 3D navigation routing
Published 2007“…In this paper, an approach for finding shortest path or route in a dynamic situation for indoors and outdoors using Single Sink Shortest Path (SSSP) routing algorithm is proposed. …”
Get full text
Get full text
Conference or Workshop Item -
16
The performance effect due to varying network topologies on a software-defined network employing the k-shortest path
Published 2022“…However, constraints such as the need to bypass the node which has a high rate of failure exist to prevent the Dijkstra algorithm from meeting this demand. In practice, we need not only consider the shortest path but also consider the second short path, the third short path, and so on. …”
Get full text
Get full text
Article -
17
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…The collision potential will determine whether the avoidance mode needs to be activated or not and collision data (such as collision point, overlap time range, and collision time) will be used in conflict resolution. Secondly, a collision avoidance algorithm is designed to propose a new flight path in order to perform an avoidance maneuver for hosting UAV. …”
Get full text
Get full text
Thesis -
18
Real-Time Optimal Trajectory Correction (ROTC) for autonomous quadrotor / Noorfadzli Abdul Razak
Published 2018“…The second stage focuses on using the vector to generate an admissible cubic path via Hermite interpolation technique integrated with time and tangent transformation scheme. …”
Get full text
Get full text
Thesis -
19
-
20
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
Published 2008“…The second proposed algorithm is focused on the AODV route discovery. …”
Get full text
Get full text
Thesis
