Results 51 to 60 of about 47,124 (214)
RRT algorithm for path clipping of robotic arm guided by graph complexity
Aimed at the issues of slow convergence speed, high path redundancy, and low sampling point utilization caused by the random sampling characteristics of the rapidly-exploring random tree (RRT) algorithm, a new solution was proposed.First, the graph ...
SHEN Danfeng +3 more
doaj +1 more source
PENERAPAN ALGORITMA DIJKSTRA PADA APLIKASI JASA TRANSPORTASI ONLINE DI KOTA MEDAN
This study aims to determine the shortest route in the application of online transportation services which is the main attraction for entrepreneurs who want to start looking for their fortune in technology and transportation, given the enormous ...
abdul alfattah hidayah
doaj +1 more source
Strategic Impact of EU Taxonomy on Pharmaceutical Firms' Performance
ABSTRACT Sustainability has become a central concern in economic policy and corporate governance, increasingly formalised through regulatory frameworks of the European Union (EU). The European Commission has published the EU Taxonomy, which allows economic activities and their contribution to sustainability to be analysed, taking into account ...
Alicia Ramírez‐Orellana +3 more
wiley +1 more source
Research on optimal emergency evacuation path for mine water inrush based on dynamic D-K algorithm
After the occurrence of mine water inrush, choosing the appropriate emergency evacuation path is very important to reduce the casualty and the mine accident level.
Biao XIE +6 more
doaj +1 more source
ABSTRACT This study explores how digital dynamic capabilities (DDC)—specifically digital absorptive capacity (DAC) and digital transformation capacity (DTC)—contribute to environmental sustainability (ES), both directly and through circular supply chain practices (CSCP).
Yi Liang, Tae‐Hoo Kim, Min‐Jae Lee
wiley +1 more source
Information-Aware Secure Routing in Wireless Sensor Networks
Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes.
Qiong Shi +5 more
doaj +1 more source
Non‐Uniform Programmable Photonic Waveguide Meshes
Integrating defect cells into uniform hexagonal waveguide meshes overcomes the fundamental spectral and temporal limitations of programmable photonics. By leveraging the Vernier effect through non‐uniform coupled cavities, this architecture achieves a tenfold increase in free spectral range and ultra‐fast sampling times, paving the way for next ...
Cristina Catalá‐Lahoz, José Capmany
wiley +1 more source
Secured Wireless Communications Using Multiple Active and Passive Intelligent Reflecting Surfaces
This paper presents a novel approach to secure wireless communications by integrating multiple Active and Passive Intelligent Reflecting Surfaces (MAMP-IRSs).
Apichart Nutchanat +2 more
doaj +1 more source
Dynamizing Dijkstra: A solution to dynamic shortest path problem through retroactive priority queue
Dynamic shortest path algorithms are the ones which are used to accommodate the online sequence of update operations to the underlying graph topology and also facilitate the subsequent query operations.
Sunita, Deepak Garg
doaj +1 more source
Implementasi Algoritma Dijkstra pada Game Pacman [PDF]
Pacman is one of the labyrinth-shaped games where this game has used artificial intelligence, artificial intelligence is composed of several algorithms that are inserted in the program and Implementation of the dijkstra algorithm as a method of solving ...
Aminudin, S. (Sidiq) +4 more
core

