Search Results - (( java application means algorithm ) OR ( variable evaluation path algorithm ))

Refine Results
  1. 1

    A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments by Khaksar, Weria

    Published 2013
    “…Sampling-based motion planning is a class of randomized path planning algorithms with proven completeness. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A multi-objective parametric algorithm for sensor-based navigation in uncharted terrains by Khaksar W., Sahari K.S.M.

    Published 2023
    “…These parameters are designed carefully to cover different requirements of the path planner. Readings of the sensors will be evaluated to determine the values of four decision variables and the next position of the robot will be selected accordingly. …”
    Article
  3. 3

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The K-means algorithm has been around for over a century. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  6. 6

    Optimum Feeder Routing and Distribution Substation Placement and Sizing using PSO and MST by Hasan, Ihsan Jabbar, Gan, Chin Kim, Shamshiri, Meysam, Ab Ghani, Mohd Ruddin, Omar, Rosli

    Published 2014
    “…The proposed algorithm has been evaluated on the distribution network case with 500 consumers which are consisting of residential and commercial loads. …”
    Get full text
    Get full text
    Article
  7. 7

    A Fuzzy Logic Positional-Based Controller For Sensorbased Robotic Motion Planning by Khaksar W., Yousefi M., Saharia K.S.M., Ismail F.B.

    Published 2023
    “…The designed controller defines three positional variables for destination evaluation in order to improve the path length and runtime of the solutions. …”
    Article
  8. 8
  9. 9

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of a motion planning and obstacle avoidance algorithm using adaptive neuro fuzzy inference system for mobile robot navigation by Muslim, Farah Kamil Abid

    Published 2017
    “…An adaptive neuro-fuzzy inference system (ANFIS) was designed which constructs and optimizes a fuzzy logic controller using a given dataset of input/output variables in order for the mobile robot to learn. This depends on the previous outcomes to generate a short path with a low runtime for an obstacle avoidance system unique to mobile robot navigation in dynamic environments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Cyber hygiene during Covid-19 to avoid cyber attacks by Lee, Yvonne Yi Jin

    Published 2022
    “…After received the responds from participants, we had run the analysis on all the variables by using SmartPLS 3.3 and calculate the PLS-SEM algorithm of the variables. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    How social media crisis response and social interaction is helping people recover from Covid-19: an empirical investigation by Bukar, Umar Ali, A. Jabar, Marzanah, Sidi, Fatimah, Nor, R. N. H., Abdullah, Salfarina, Ishak, Iskandar

    Published 2022
    “…Furthermore, the IPMA was applied to evaluate the model’s usefulness, which compares the level of the variables from the performance scale mean value against the importance level. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis