Search Results - (( tree navigation using algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- navigation using »
- java application »
- tree navigation »
- using algorithm »
-
1
-
2
Stereo matching algorithm using census transform and segment tree for depth estimation
Published 2023“…This article proposes an algorithm for stereo matching corresponding process that will be used in many applications such as augmented reality, autonomous vehicle navigation and surface reconstruction. …”
Get full text
Get full text
Get full text
Article -
3
Adaptive rapidly-exploring-random-tree-star (Rrt*) -Smart: algorithm characteristics and behavior analysis in complex environments
Published 2013“…Navigation experiments using the real Pioneer 3-AT Mobile Robot provide a proof of the concept.…”
Get full text
Get full text
Get full text
Article -
4
-
5
Comparison of path planning in simulated robot
Published 2020“…There are 4 path planning algorithms will be compared, which are Dijkstra’s algorithm, A* algorithm, RapidExploring Random Tree (RRT) algorithm, and the last one is an algorithm modified from A*. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Hardware development of autonomous mobile robot based on actuating lidar
Published 2022“…From here, the extracted values are implied on k-NN, Decision Tree and CNN training algorithm. The final result shows promising potential with 91% prediction when implemented on the Decision Tree algorithm based on our proposed system of a single actuating LiDAR sensor.…”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
Energy efficiency mechanism using mobile-based fermat's spiral in wireless sensor networks
Published 2011“…We evaluated the performance of wireless sensor network using minimum spanning tree algorithm specifically Prim’s Algorithm in order to know the bottleneck effect on wireless sensor network and propose a better solution performance based on Fermat Spiral model. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
11
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
14
Simultaneous measurement of multiple soil properties through proximal sensor data fusion: a case study
Published 2019“…Predictions of pH and LBC were only feasible using MARS and PLSR, respectively. In this field, it was not possible to predict extractable P and K using all tested sensor combinations or algorithms. …”
Get full text
Get full text
Article
