Search Results - (( using rule ((method algorithm) OR (path algorithm)) ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- method algorithm »
- java application »
- path algorithm »
- using rule »
-
1
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
2
The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail
Published 2017“…The input data of this project is retrieved from the game’s rule itself and implemented with the proposed algorithm which is A* algorithm. …”
Get full text
Get full text
Thesis -
3
-
4
Utilization of Tabu search heuristic rules in sampling-based motion planning
Published 2023Conference Paper -
5
A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments
Published 2013“…These algorithms generate paths using random numbers and perform efficiently in guiding the robot in known environments. …”
Get full text
Get full text
Thesis -
6
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…The second approach is the modification of heuristic computation using original A* and modified Bresenham. Bresenham Line Algorithm is a line generation algorithm using integer arithmetic where the points (x1, y1) and (x2, y2) are assumed not equal and integer valued. …”
Get full text
Get full text
Get full text
Thesis -
7
Hybrid Balance Artificial Potential Field Navigation System For An Autonomous Surface Vessel In Riverine Environment
Published 2019“…There are two issues related to ASV autonomous riverine navigation; river environment modelling and autonomous path planning and obstacles avoidance. Thus, the objectives of the research are: to develop a riverbanks identification algorithm for ASV navigation; and to develop a marine traffic rules compliant navigation and obstacles avoidance algorithm for ASV in the unstructured riverine environment. …”
Get full text
Get full text
Thesis -
8
Propositional satisfiability method in rough classification modeling for data mining
Published 2002“…The classification accuracy, the number of rules and the maximum length of rules obtained from the SIPIDRIP method was compared with other rough set method such as Genetic Algorithm (GA), Johnson, Holte l R, Dynamic and Exhaustive method. …”
Get full text
Get full text
Thesis -
9
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
10
Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems
Published 2015“…The WNMPC is developed by a proposed algorithm named adaptive updating rule (AUR) used with gradient descent optimization method to minimize a constrained cost function over the prediction and control horizons and to offer a robust control performances. …”
Get full text
Get full text
Thesis -
11
Obstacle Avoidance of a Mobile Robot Using Fuzzy Logic Control
Published 1999“…Moreover, two different implication methods (Mamdani minimum and Mamdani Product) implications are used in the interpretation of the IF-THEN rules in the rule-base. …”
Get full text
Get full text
Thesis -
12
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
13
Optimization of multi-holes drilling path using particle swarm optimization
Published 2022“…One way to improve the multi-hole drilling is by optimising the tool path in the process. This research aims to model and optimise multi-hole drilling problems using Particle Swarm Optimisation (PSO) algorithm. …”
Get full text
Get full text
Thesis -
14
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…PMTRF modules and their algorithms enable the isolation of the maintenance switch and the selection of the most reliable path for future affected flows based on input time provided by the administrator. …”
Get full text
Get full text
Get full text
Thesis -
15
Unconstraint assignment problem : a molecular computing approach
Published 2006“…During the encoding phase, a method toencode the computational problem is carried out by introducing four rules. …”
Get full text
Get full text
Article -
16
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
17
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…In this regards, a new method of Pico-satellite attitude control using Mamdani Fuzzy Logic Principles is introduced. …”
Get full text
Thesis -
18
Mobile robot navigation using GPS to solve target location achieving problem / Saiful Zaimy Yahaya, Rozan Boudville and Mohamad Faizal Abdul Rahman
Published 2010“…The path finding algorithm will basically finds the best path and instructs the robot to moves to its location by keep on refreshing its positions. …”
Get full text
Get full text
Research Reports -
19
Laser simulator: a novel search graph-based path planning approach
Published 2018“…In global path planning, the path is generated within a grid map of the roundabout environment to select the path according to the respective road rules. …”
Get full text
Get full text
Get full text
Article -
20
Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
Published 2020“…Two algorithms are proposed, utilizing single-path and multipath in transmission flow. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
