Search Results - (( using function path algorithm ) OR ( based constructive _ algorithm ))
Search alternatives:
- based constructive »
- using function »
- path algorithm »
- function path »
-
1
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
2
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The whole constraint analyzer and the fitness function were combined with four SBTs (genetic algorithm, evolutionary algorithm, simulating annealing, and quantum genetic algorithm). …”
Get full text
Get full text
Get full text
Thesis -
3
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
Get full text
Get full text
Thesis -
4
Autonomous path planning through application of rotated two-parameter overrelaxation 9-point Laplacian iteration technique
Published 2020“…The harmonic functions are an appropriate method to be used on autonomous path planning because it satisfies the min-max principle, therefore avoiding the occurrence of local minima which traps robot’s movements, and that it offers complete path planning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
Development of a motion planning and obstacle avoidance algorithm using adaptive neuro fuzzy inference system for mobile robot navigation
Published 2017“…The designed multilayer decision-based fuzzy logic model effectively solves the path planning queries in crowded and complex situations without any failure. …”
Get full text
Get full text
Get full text
Thesis -
6
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…Factors contributing to the failure are a mathematical weakness found in the Boolean functions used by these cryptographic hash functions, linear message expansion and poor difusion in the step operation. …”
Get full text
Get full text
Thesis -
7
A-star (A*) algorithm implementation for robotics path planning navigation
Published 2018“…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah
Published 1997“…The euler's path it using pseudo input and Heuristic algorithm to find the minimum interlace. …”
Get full text
Get full text
Thesis -
9
Development of robot kit for visually impaired
Published 2017“…Thus, the speed of the wheels is based on the condition of environment. To test the functionality of the obstacle avoidance algorithm, the guidance robot is tested in three different situations. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Conference Paper -
11
Hybrid path planning for indoor robot with Laplacian Behaviour-based control via four point-explicit group
Published 2014“…Consequently, the gradient of the potential functions would be used by the searching algorithm to generate path from starting to goal location. …”
Get full text
Get full text
Get full text
Article -
12
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
13
Modeling and sensitivity analysis of a multi-nets anns model for real-time performance-based condition monitoring of an industrial gas turbine engine
Published 2016“…Three-layer feed-forward configuaration is chosen to construct the networks, the Levenberg-Marquardt algorithm is used as the training function, and the k-fold cross-validation process is employed to obtain the optimum number of neurons in the hidden layers. …”
Get full text
Get full text
Article -
14
Modeling and sensitivity analysis of a multi-nets anns model for real-time performance-based condition monitoring of an industrial gas turbine engine
Published 2016“…Three-layer feed-forward configuaration is chosen to construct the networks, the Levenberg-Marquardt algorithm is used as the training function, and the k-fold cross-validation process is employed to obtain the optimum number of neurons in the hidden layers. …”
Get full text
Get full text
Article -
15
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…However, this assumption may lead to inaccurate secondary path model. In this work, the modelling of acoustic path using FIR filters is incorporated for both algorithms for Wiener-Hammerstein structure. …”
Get full text
Get full text
Thesis -
16
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
17
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…Significant research has been conducted on Unmanned Aerial Vehicle (UAV) path planning using evolutionary algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), and Biogeographic-Based Optimization (BBO). …”
Get full text
Get full text
Thesis -
18
Robotic indoor path planning using dijkstra's algorithm with multi-layer dictionaries
Published 2016“…The path computed using the classic Dijkstra's algorithm is the shortest; however, it may not be the most feasible. …”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Wi-fi fingerprint database construction using Chebyshev wavelet functions
Published 2015“…Next, the collected reference samples are used to construct area specific path-loss prediction function using Chebyshev wavelets. …”
Get full text
Get full text
Conference or Workshop Item
