Search Results - (( basic evaluation path algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- basic evaluation »
- java application »
- evaluation path »
- path algorithm »
-
1
-
2
Shortest Path Trajectory System Based on Dijkstra Algorithm
Published 2012“…In the master project, the researcher discussed the shortest path solution to a single source problem based on Dijkstra algorithm as resolving the basic concepts. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Mobile robot navigation using GPS to solve target location achieving problem / Saiful Zaimy Yahaya, Rozan Boudville and Mohamad Faizal Abdul Rahman
Published 2010“…The path finding algorithm will basically finds the best path and instructs the robot to moves to its location by keep on refreshing its positions. …”
Get full text
Get full text
Research Reports -
4
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…Finally, the proposed ASH was tested on two well known benchmark data sets to evaluate its performance and effectiveness. The computational results suggest that the AS approach embedded with heuristic(s) outperforms the pure AS algorithm. …”
Get full text
Get full text
Thesis -
5
Network analysis for GPS UTMnav system: preliminary stage
Published 2008“…Each algorithm was reviewed and a simulation test was conducted to evaluate the selected algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
-
8
An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP
Published 2021“…The proposed algorithm is found to provide better solutions with shorter paths when applied to TSP as compared to swap sequence based PSO. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
10
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…It is observed that the APFLC showed convincing performance over the entire simulation of the Pico-satellite. Genetic Algorithm (GA) is a computational model inspired by evaluation. …”
Get full text
Thesis -
12
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…Results gained from the performance evaluation show that the proposed models able to improve PDR, selection accuracy, path length, node’s trust value and significantly reduced the packet loss rate. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
15
Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques
Published 2021“…Finally, the Buildings Footprint developed based on the algorithm was compared with the Buildings Footprint developed manually to assess the accuracy of the results. …”
Get full text
Get full text
Get full text
Thesis
