Search Results - (( java application a algorithm ) OR ( _ modification ((method algorithm) OR (path algorithm)) ))
Search alternatives:
- java application »
- method algorithm »
- path algorithm »
- application a »
- a algorithm »
-
1
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…The simulation results indicate that the algorithm is able to segregate and assign the tasks for each scanning head and also able to find the shortest scanning path for different types of objects coordination. …”
Get full text
Get full text
Thesis -
2
Enhancing performance of global path planning for mobile robot through Alpha–Beta Guided Particle Swarm Optimization (ABGPSO) algorithm
Published 2025“…The results reveal that our proposed method reduces the mobile robot's travel time by up to 69%, 67%, 72%, and 79% compared to these algorithms, while consistently achieving optimal path lengths. …”
Get full text
Get full text
Get full text
Article -
3
A review on path planning and obstacle avoidance algorithms for autonomous mobile robots
Published 2022“…As a result, many methods have been established worldwide for the path planning strategy for mobile robots. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
5
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2023“…Also, proposed are the new modifications to existing crossover operator called DPPC (Dynamic Pre-Populated Crossover) together with modification of a simple crossover selection method, called BCS (Bi-Cycle Selection Method). …”
Article -
6
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2023“…Also, proposed are the new modifications to existing crossover operator called DPPC (Dynamic Pre-Populated Crossover) together with modification of a simple crossover selection method, called BCS (Bi-Cycle Selection Method). …”
Article -
7
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2006“…Also, proposed are the new modifications to existing crossover operator called DPPC (Dynamic Pre-Populated Crossover) together with modification of a simple crossover selection method, called BCS (Bi-Cycle Selection Method). …”
Get full text
Get full text
Get full text
Article -
8
Research on risk detection of autonomous vehicle based on rapidly-exploring random tree
Published 2023“…A non-particle collision detection (NPCD) collision detection algorithm and path modification (PM) path modification strategy are proposed for the collision risk in the turning process, and geometric constraints are used to represent the possible security threats, so as to improve the efficiency and safety of vehicle global path driving and to provide reference for the research of driverless vehicles.…”
Get full text
Get full text
Get full text
Get full text
Article -
9
Modification of dijkstra's algorithm for safest and shortest path during emergency evacuation
Published 2015“…Therefore, this paper presents the methodology used for the modification of Dijkstra's algorithm to find the safest and shortest path. …”
Get full text
Get full text
Get full text
Article -
10
Hybrid genetic algorithm with multi-parents recombination for job shop scheduling problems / Ong Chung Sin
Published 2013“…This mechanism is restricted to search the possible solutions in a critical path. Modification on the path by using neighborhood search significantly reduces the total length of the makespan. …”
Get full text
Get full text
Get full text
Thesis -
11
Articulated robots motion planning using foraging ant strategy
Published 2008“…This paper proposes a novel search technique, the F-Ant algorithm, in order to find a reliable path between the initial configuration and the goal configuration of the articulated robot. …”
Get full text
Get full text
Article -
12
Shortest Path Trajectory System Based on Dijkstra Algorithm
Published 2012“…This project includes the modification of main algorithm which has been implemented in the prototype development. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
14
Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing
Published 2007“…In order to utilize the high performance hardware priority queue module, modifications have to be made on the graph-based shortest path algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System
Published 2024“…LTE-A Improved Channel (LTE-AIC) was suggested and implemented with proposed algorithms and methods to compare with conventional LTE-A and LTE as a benchmark. …”
Get full text
Get full text
Get full text
Thesis -
16
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…Jump Point Search is one of the path finding algorithm with huge advantage of maintaining zero memory overhead as no preprocessing process involved. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
19
New reflector shaping methods for dual-reflector antenna
Published 2022“…In this paper, modification to the reflector shaping method using equivalent parabola reflector and equivalent circle reflector method is proposed to achieve a good multi beam radiation patterns. …”
Get full text
Get full text
Article -
20
On-chip communication system modeling approach for reability analysis focusing on functional failures
Published 2012“…The algorithms were verified and the resultsshow that minimum accuracy of 96% is maintained by applying the proposed crosstalk modeling approach while the number of required simulations is reduced by at least factor of 59% for modeling window sizes bigger than 3. …”
Get full text
Get full text
Thesis
