Search Results - (( solution simulation game algorithm ) OR ( java application system algorithm ))
Search alternatives:
- solution simulation »
- java application »
- system algorithm »
- simulation game »
- game algorithm »
-
1
Methods of aircraft trajectory optimisation in air combat
Published 2007“…Simulations show that the algorithm is able to find good individuals (or solutions) in a limited time.…”
Get full text
Get full text
Article -
2
Artificial neural controller synthesis for TORCS
Published 2015“…In other way, player may uninstall the game if they found the game is not beatable after spending few days on the game. …”
Get full text
Get full text
Thesis -
3
-
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
-
6
Nature-Inspired cognitive evolution to play Ms. Pac-Man
Published 2011“…On the other hand, an evolutionary algorithm is to simulate the biological evolutionary processes that evolve potential solutions in order to solve the problems or tasks by applying the genetic operators such as crossover, mutation and selection into the solutions. …”
Get full text
Get full text
Get full text
Article -
7
Energy-efficient communications in wireless powered cognitive radio networks based on game theory / Fadhil Mukhlif Aswad Al-Obaidy
Published 2020“…In order to prove the effectiveness of such algorithms, numerical solutions are used in comparison with current power control algorithms. …”
Get full text
Get full text
Get full text
Thesis -
8
Distributed learning based energy-efficient operations in small cell networks
Published 2023“…The thesis proposed a solution that employs unique characteristics of machine learning and game-theoretic framework to enable a model-free and energy-efficient small cell network. …”
Get full text
Get full text
Thesis -
9
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Distance approximation using pivot point in narrow phase collision detection
Published 2013“…Most computer games and simulation maintain speed as the main important elements while others such as medical and mechanical simulation needs to have a very high precision collision detection technique. …”
Get full text
Get full text
Conference or Workshop Item -
11
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
12
-
13
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
17
-
18
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis -
19
An Enhanced Dynamic Spectrum Allocation Method on Throughput Maximization in Urban 5G FBMC Heterogeneous Network
Published 2024“…In this paper, an enhanced dynamic spectrum allocation (E-DSA) method is proposed, which incorporates a cooperative type of game theory called the Nash bargaining solution (NBS). …”
Article -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
