Search Results - (( variable integrated path algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Development of robust control scheme for wheeled mobile robot in restricted environment by Muhammad Sawal, A Radzak

    Published 2021
    “…A simulation study of WMR control in pre-planned paths in two environments namely, zigzag and highly curved terrains, has been conducted to verify the proposed algorithm and compare it with other existed algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Empirical analysis and optimization suggestions of Peking Opera audience's use intention of Kuaishou app by Shixia, Yang, Alexander, Chelum

    “…The test of the moderating effect finds that Peking Opera exposure experience produces a significant moderating effect in all paths where independent variables influence usage intention, while age only exerts a specific moderating effect in the paths of effort expectancy and algorithm recommendation on usage intention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A real-time integrated fire detection and alarm (FDA) system for network based building automation by Anwar, Farhat, Islam, Rounakul, Hussain, Sabahat, Rashid, Muhammad Mahbubur, Shaikh, Zuhaib

    Published 2017
    “…Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Resource Efficient For Hybrid Fiber-Wireless Communications Links In Access Networks With Multi Response Optimization Algorithm by Wong, Adam Yoon Khang, Indra, Win Adiyansyah, Jamil Alsayaydeh, Jamil Abedalrahim, Mohamat Gani, Johar Akbar, M. Idrus, Sevia, Pusppanathan, Jaysuman

    Published 2021
    “…This work proposes a Multi response Optimization (MO) algorithm, named MO-LMMHOWAN that apply in Last Mile Mobile Hybrid Optical Wireless Access Network (LMMHOWAN). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Program slice is the part of program that may take the program off the path of the desired output at some point of its execution. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item