Search Results - (( next generation path algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- generation path »
- using algorithm »
- path algorithm »
- next »
-
1
Optimised multi-robot path planning via smooth trajectory generation
Published 2024“…A MPSO algorithm, without path smoothening, is used for comparison. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The mean path cost generated by the LS algorithm, on the other hand, is 14% higher than that generated by the PRM. …”
Get full text
Thesis -
3
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…Bresenham Line Algorithm is a line generation algorithm using integer arithmetic where the points (x1, y1) and (x2, y2) are assumed not equal and integer valued. …”
Get full text
Get full text
Get full text
Thesis -
4
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…The next-generation cyber defense that relies on predictive analysis is more proactive than existing technologies that rely on intrusion detection. …”
Get full text
Get full text
Get full text
Article -
6
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The attack surface for hackers is growing as more devices are linked to the internet. The next generation cyber defence concentrating on predictive analysis seems more proactive than existing technologies based on intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
A coverage path planning approach for autonomous radiation mapping with a mobile robot
Published 2023Article -
9
-
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
Fair and fit resource allocation algorithm for network-controlled device-to-device (D2D) communication / Yusmardiah Yusuf, Darmawaty Mohd. Ali and Roslina Mohamad
Published 2021“…In this paper, a Fair and Fit Resource Allocation (FFRA) algorithm is proposed which exploits the path loss experienced by the potential D2D user equipments (UEs) when choosing the communication path. …”
Get full text
Get full text
Get full text
Article -
12
Improvement of Centralized Routing and Scheduling Using Cross-Layer Design and Multi-Slot Assignment in Wimax Mesh Networks
Published 2009“…This thesis also proposes a centralized scheduling algorithm that can avoid the collision by constructing routing path with multi-slot single transceiver system for WiMAX mesh networks. …”
Get full text
Get full text
Thesis -
13
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
15
Discrete simulation framework for wireless cellular networks.
Published 2008“…The aim of the discrete simulation framework is to deal with issues of the next generation of wireless cellular networks (e.g., multimedia traffic, radio resource management and mobility... etc) and to provide a platform for current and future investigations involving wireless cellular networks. …”
Get full text
Get full text
Article -
16
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
18
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
19
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Cross layer design in 802.16d
Published 2009“…It has high-speed data rate for large spanning area and is the key topology for the next generation wireless networking. The WIMAX mesh network (WMN) is developed with the use of base station (BS) as the main controller. …”
Get full text
Get full text
Get full text
Article
