Search Results - (( virtual optimization path algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Optimal path planning algorithms in virtual environments by Hassan, Rohayanti

    Published 2006
    “…The main aim of the research was to find an efficient route tour approach that combines path finding, path planning and path optimization algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An efficient virtual tour : a merging of path planning and optimization by Abd Latiff, Muhammad Shafie, Hassan, Rohayanti

    Published 2004
    “…This paper describes the result of a research project aimed to integrate a path-planning optimization-algorithm and produce an efficient tour in a virtual environment. …”
    Get full text
    Get full text
    Article
  3. 3

    New algorithm for autonomous dynamic path planning in real-time intelligent robot car by Mohammed, Akeel Ahmed, Hassan, Mohd Khair, Aris, Ishak, Kamsani, Noor Ain

    Published 2017
    “…Different algorithms have been used to address this problem by considering the optimal path with minimum cost; however, these algorithms did not consider the execution time to find such path. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment by Nurul Atikah Janis

    Published 2018
    “…Jump Point Search is one of the path finding algorithm with huge advantage of maintaining zero memory overhead as no preprocessing process involved. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    AR technology-assisted selfie design and dissemination path analysis by Zhang, Di, Alsagoff, Syed Agil, Yasin, Megat Al Imran, Razi, Siti Aishah Muhammad

    Published 2023
    “…Augmented reality (AR) is a technology based on 3D registration, virtual-real fusion and human-computer interaction to achieve the integration of virtual objects and real scenes. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…Compared to the Ant Colony Optimization-Genetic Algorithm (ACO-GA) and Ant Colony Optimization- Hierarchical Clustering Mechanism (ACOHCM), the ACO algorithm shows superior power savings and efficiency. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Controller placement problem in the optimization of 5G based SDN and NFV architecture by Ibrahim, Abeer Abdalla Zakaria

    Published 2021
    “…Integrating Software Defined Networking (SDN) with Network Function Virtualization (NFV) is a low-cost way to build a reconfigurable network, reduce operating costs, and optimize network performance. …”
    Get full text
    Get full text
    Thesis
  13. 13

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16
  17. 17
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis