Search Results - (( mobile application new algorithm ) OR ( _ application ((out algorithm) OR (cpdod algorithm)) ))

Refine Results
  1. 1
  2. 2
  3. 3

    A generalized laser simulator algorithm for mobile robot path planning with obstacle avoidance by Muhammad, Aisha, Ali, Mohammed A.H., Turaev, Sherzod, Abdulghafor, Rawad Abdulkhaleq Abdulmolla, Shanono, Ibrahim Haruna, Alzaid, Zaid, Alruban, Abdulrahman, Alabdan, Rana, Dutta, Ashit Kumar, Almotairi, Sultan

    Published 2022
    “…This paper aims to develop a new mobile robot path planning algorithm, called generalized laser simulator (GLS), for navigating autonomously mobile robots in the presence of static and dynamic obstacles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mobile game application development using evolutionary algorithms by Ong, Jia Hui

    Published 2014
    “…Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…Through maximum sized cliques and dummy query generation, more user queries get cloaked within a reasonable amount of time, thereby providing cloaked within a reasonable amount of time, thereby providing better privacy protection when using LBS applications. The experimental results showed that the proposed cloaking algorithm out performed existing algorithms such as IClique, OptClique and MMBClique in terms of its cloaking success rate and processing time.…”
    Get full text
    Get full text
    Article
  12. 12

    Enhanced dynamic source routing (En-Dsr) with QOS based routing for IPV6 in ad Hoc Networks by Tai, Wai Yee

    Published 2013
    “…Without any centralized management system, mobile nodes use routing algorithm to perform the routing process from finding a route to sending data to their recipients. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Brain Machine Interface Controlled Robot Chair by Hema Chengalvarayan, Radhakrishnamurthy

    Published 2010
    “…The BMI controls the joystick of the robot chair using a shared control algorithm. Real-time experiments are also presented using 10 trained and 5 untrained subjects to validate the applicability of the brain machine interface. …”
    Get full text
    Thesis
  14. 14

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…Nonetheless, upon carrying out a robustness test on new data, it was demonstrated that the CWT-NasNetMobile-kNN pipeline yielded the best performance. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    PoshPick / Aiman Ariff Suliman ... [et al.] by Suliman, Aiman Ariff, Ahmad Liza, Aina Aniqah, Anuar, Danish Faid, Mohd Rizal, Nur Alia Aqilah, Ibrahim, Nurin Farhah, Mohd Fabli, Siti Nur Nashwa Faqihah

    Published 2023
    “…In this New Product Development (NPD) report, we came out with a solution to this problem which is by developing a blueprint by using mobile applications. …”
    Get full text
    Get full text
    Entrepreneurship Project
  18. 18

    Enhancement Of Aodv Routing Protocol In Masnets by Jambli, M.N., Wan Mohd Shuhaimi, W.B., Lenando, H., Abdullah, J., Mohamad Suhaili, S.

    Published 2015
    “…Nowadays, most of researchers working on Wireless Sensor Networks (WSNs) focus on Mobile Ad-hoc and Sensor Networks (MASNETs) due to their wide range of potential applications ranging from underwater monitoring to search and rescue mobile robotics applications. …”
    Get full text
    Get full text
    Proceeding
  19. 19

    Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network by Al-Kharasani, Nori Mohammed Abdulkarem

    Published 2020
    “…To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
    Get full text
    Get full text
    Thesis
  20. 20