Search Results - (( java implication _ algorithm ) OR ( based detection ((path algorithm) OR (based algorithm)) ))
Search alternatives:
- java implication »
- based detection »
- path algorithm »
-
1
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…In this paper, GA path-planning approach is enhanced with feasible path detection mechanism based on traversability vectors method. …”
Get full text
Get full text
Get full text
Article -
2
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…The algorithm is based on PTCOT (Parametric Theorem and Circle Overlapping Test) between two UAVs. …”
Get full text
Get full text
Thesis -
3
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…A model-driven approach was used for generating abstract test cases from the feasible paths. This model driven approach was integrated with the proposed infeasible path detection method which based on analyzing various OCL constructs and operations. …”
Get full text
Get full text
Get full text
Thesis -
4
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The proposed algorithm will switch its working pattern based on the goal minimum and boundary maximum index distances. …”
Get full text
Thesis -
5
-
6
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
7
UAV collision detection algorithm design based on circle overlapping test
Published 2012“…This paper proposes a design of collision avoidance algorithm for unmanned aerial vehicle based on circle overlapping test. …”
Get full text
Get full text
Conference or Workshop Item -
8
AUTOMATED GUIDED ROBOT (AGR)
Published 2007“…Algorithm conversion to C code programming has been done throughout the project for the obstacle avoidance and path planning algorithms based upon the GA platform ofAI.…”
Get full text
Get full text
Final Year Project -
9
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
10
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
11
-
12
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
13
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
14
Energy-Aware Routing Hole Detection Algorithm in the Hierarchical Wireless Sensor Network
Published 2019“…In this paper a novel energy efficient routing hole detection (EEHD) algorithm is presented, on the detection of routing hole, the periodic re-clustering is performed to avoid the long detour path. …”
Get full text
Get full text
Get full text
Article -
15
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…The next-generation cyber defence concentrating on predictive analysis seems more proactive than existing technologies based on intrusion detection. Recently, many approaches have been proposed to detect and predict attacks; one of these approaches is attack graphs. …”
Get full text
Get full text
Get full text
Thesis -
16
Path Planning and Control of Mobile Robot in Road Environments using Sensor Fusion and Active Force Control
Published 2018“…The path planning and roundabout detection are determined based on LS and sensor fusion of a laser range finder (LRF), camera and odometry measurements. …”
Get full text
Get full text
Get full text
Article -
17
The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi
Published 2017“…However, for optimum distance, dijkstra algorithm has been used. This algorithm is one of the algorithms used for getting the lowest cost search path. …”
Get full text
Get full text
Thesis -
18
Research on risk detection of autonomous vehicle based on rapidly-exploring random tree
Published 2023“…A non-particle collision detection (NPCD) collision detection algorithm and path modification (PM) path modification strategy are proposed for the collision risk in the turning process, and geometric constraints are used to represent the possible security threats, so as to improve the efficiency and safety of vehicle global path driving and to provide reference for the research of driverless vehicles.…”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…A routing algorithm has been developed to create a routing path between all transmission towers in the image, which helps identify the power line path. …”
text::Thesis
