Search Results - (( using segmentation path algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- using segmentation »
- segmentation path »
- validation using »
- java validation »
- using algorithm »
- path algorithm »
-
1
Route optimization using shortest path method / Muhamad Faisal Amin Shakri
Published 2025“…This study investigated the implementation and comparison between well known shortest path method which are Dijkstra’s algorithm, Bellman-Ford, and A* algorithm. …”
Get full text
Get full text
Thesis -
2
Novel algorithm for mobile robot path planning in constrained environment
Published 2021“…This paper presents a development of a novel path planning algorithm, called Generalized Laser simulator (GLS), for solving the mobile robot path planning problem in a two-dimensional map with the presence of constraints. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
4
Novel algorithm for mobile robot path planning in constrained environment
Published 2022“…This paper presents a development of a novel path planning algorithm, called Generalized Laser simulator (GLS), for solving the mobile robot path planning problem in a two-dimensional map with the presence of constraints. …”
Get full text
Get full text
Get full text
Article -
5
Novel algorithm for mobile robot path planning in constrained environment
Published 2022“…This paper presents a development of a novel path planning algorithm, called Generalized Laser simulator (GLS), for solving the mobile robot path planning problem in a two-dimensional map with the presence of constraints. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Energy efficient path-planning for unmanned aerial vehicle
Published 2022“…The proposed path planning algorithm is called Iterative Elliptical- Convex Visibility Graph (IECoVG) which is based on visibility graph (VG) and Dijkstra’s algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…The warppartial least square method was utilized to estimate the multi-layer hypothesized path model. This model estimated warped coefficients using the overall linear trend found in linear segments of non-linear relationships. …”
Get full text
Get full text
Thesis -
9
Modeling and querying alternative paths in Kuantan
Published 2007“…Route finding solution takes the distance information in the form of directed graph based on starting (source) and ending (destination) nodes for the desired paths. The graph theory algorithm used in this study is applied from the Floyd’s approach and using the combination of searching techniques of breadth first search (BFS) and depth first search (DFS) strategies. …”
Get full text
Get full text
Get full text
Thesis -
10
Object tracing from synthetic fluid spray through instance segmentation
Published 2024“…The resulting objects were then analyzed using a customized nearest neighbor algorithm to calculate their correspondence between frames and a BFS algorithm was used to trace their movement path. …”
Get full text
Get full text
Thesis -
11
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
12
A coverage path planning approach for autonomous radiation mapping with a mobile robot
Published 2023Article -
13
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
14
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
15
Ant-based vehicle congestion avoidance framework using vehicular networks / Mohammad Reza Jabbarpour Sattari
Published 2015“…Previous researches concentrated on using static algorithms to find the shortest path in VTRSs. …”
Get full text
Get full text
Thesis -
16
-
17
A novel map-matching algorithm to improve vehicle tracking system accuracy
Published 2007“…Map-matching algorithms attempt to pinpoint the vehicle in a particular road map segment (or any restricting track such as rails, etc), in spite of the digital map errors and navigation system inaccuracies. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
An Intelligent System Approach to the Dynamic Hybrid Robot Control
Published 1996“…A one-pass smoothing algorithm was used to generate a practical smooth trajectory path in near real time. …”
Get full text
Get full text
Thesis -
19
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis
