Search Results - (( java implementation path algorithm ) OR ( basic using force algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- force algorithm »
- path algorithm »
- basic using »
- using force »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…The controller is developed based on the enhancement and modification of the basic Adaptive Interaction Algorithm Controller (AIA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Automatic prehension using an accelerometer and force sensor
Published 2005“…Having the necessary components identified, built and tested, the apparatus can be used to investigate automatic control algorithms for secure grips on objects.…”
Get full text
Get full text
Conference or Workshop Item -
7
Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif
Published 2016“…The forces were calibrated by analysing the captured deformation image of the silicone tactile sensor inner dome using camera, fibre-scope and light source. …”
Get full text
Get full text
Thesis -
8
Integrating fuzzy logic and brute force algorithm in optimizing energy management systems for battery electric vehicles
Published 2023“…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
Get full text
Get full text
Get full text
Article -
9
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…There are two basic strategies in using hybrid GAs, Lamarckian and Baldwinian evolution. …”
Get full text
Get full text
Get full text
Article -
10
Integrating fuzzy logic and brute force algorithm in optimizing Energy Management Systems for Battery Electric Vehicles
Published 2024“…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
Get full text
Get full text
Get full text
Article -
11
On spectral efficiency maximization in a partial joint processing system using a multi-start particle swarm optimization algorithm
Published 2015“…However, achieving equivalent backhaul reduction based on limited feedback channel state information is challenging when linear techniques, such as zero-forcing beamforming (BF) are used, which led to the use of stochastic algorithms instead. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique
Published 2022“…The study also developed an algorithm for predictive EMS using fuzzy model predictive control technique based on regression algorithm. …”
Get full text
Get full text
Thesis -
14
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
15
-
16
Proposed fatigue index for the objective detection of muscle fatigue using surface electromyography and a double-step binary classifier
Published 2022“…This paper presents an algorithm that employs a new fatigue index for the objective detection of muscle fatigue using a double-step binary classifier. …”
Get full text
Get full text
Article -
17
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…However, most of the existing public-key algorithms are based on complex mathematical computations. …”
Get full text
Get full text
Thesis -
18
POISSON EQUATION FOR ELECTROSTATIC FIELD USING THE FINITE DIFFERENCE METHOD
Published 2019“…The Dirichlet boundary will be use because it is nothing more than a forced solution to the potential function at specific points. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Machining characteristics of hastelloy c-2000 in end milling using artificial intelligence approach
Published 2012“…The mathematical model was developed through the response surface method (RSM) which basically focuses on machining characteristics such as surface roughness, tool life and cutting force using coated and uncoated carbide cutting inserts in wet conditions. …”
Get full text
Get full text
Thesis -
20
Stegano-image as a digital signature to improve security authentication system in mobile computing
Published 2016“…When users choose meaningful words from dictionaries, by using brute force attacks, it makes textual passwords vulnerable to dictionary and easy to break. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
