Search Results - (( java implementation path algorithm ) OR ( basic orientations _ algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- path algorithm »
- orientations »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Inverse kinematics of six degrees of freedom robot manipulator based on improved dung beetle optimizer algorithm
Published 2024“…Through the improved DBO algorithm, the position error is still accurate, and the orientation error is reduced from 9.5901 to 1.8718. …”
Get full text
Get full text
Get full text
Article -
6
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2023Article -
7
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2021“…To solve the redundancy resolution, meta-heuristic optimizations, namely Genetic Algorithm (GA) and Whale Optimization Algorithm (WOA), are applied to search optimal trajectories inside local orientation angle boundaries. …”
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
11
Mobile Robot with Navigation Control and Communication
Published 2016“…The purpose of the project is to ensure the robot will be able to do more than basic locomotion and also to do selfcorrecting orientation. …”
Get full text
Get full text
Final Year Project -
12
-
13
Development of control algorithm for a new 12s-6p single phase field excited flux switching motor
Published 2020“…For position detection, algorithms merely need a basic infrared transceiver sensor. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Indirect Rotor Field Oriented Control of Induction Motor With Rotor Time Constant Estimation
Published 2004“…However, direct and indirect field oriented control suffer from specific theoretical and practical problems. …”
Get full text
Get full text
Thesis -
15
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
16
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
17
Aiding Low Cost Inertial Navigation With Building Heading For Pedestrian Navigation
Published 2024Article -
18
Computerized simulation system for ECM radar system
Published 2007“…The principle of electromagnetic spectrum is the basic background for all calculation and simulation. …”
Get full text
Get full text
Get full text
Thesis -
19
Fingerprint reconstruction based on improved directional image
Published 2005“…The reconstruction algorithm was tested with 500 fingerprint images. The results of the experiment is very promising.…”
Get full text
Get full text
Thesis -
20
Reusing three-phase power-flow object components for unbalanced harmonic analysis
Published 2006“…The nonlinear devices such as six pulse converters are modeled as entity objects and inherited from the basic object-oriented power-system device model at fundamental frequency. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
