A Comprehensive and Comparative Study Of Maze-SolvingTechniques by Implementing Graph Theory
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: This paper presents an efficient maze solving algorithm. IEEE has launched a competition named“Micro mouse” where an autonomous robot or mice solves an unknown maze. The mouse find its way from thestarting position to the central area of the maze without any intervention. To solve the maze, the miceimplements one of many different searching algorithms such as the DFS, flood fill, BFS, modified flood fill.Several algorithms which originate from graph theory (GT) and non-graph theory (NGT) are currently beingused to program the robot or mice. To compare the algorithms efficiency, they are simulated artificially and acomprehensive study is done by interpreting the statistics of interest.
Authors and Affiliations
Keshav Sharma , Chirag Munshi
Reversible Watermarking based on Histogram ShiftingModification:A Review
Abstract: When we talk about the data communication or exchange of information from sender to receiver, themajor concern is DATA. This (data) being of high importance, prone to various kinds of attacks. In order to...
Addressing Mental Health Epidemic among University Students via Web-based, Self-Screening, and Referral System
The prevalence and severity of mental health problems in college and university communities are alarming. How-ever, the majority of students with mental disorders do not seek help from professionals.To help students...
Computational Intelligence Methods for Clustering of SenseTagged Nepali Documents
Abstract: This paper presents a method using hybridization of self organizing map (SOM ), particle swarmoptimization(PSO) and k-means clustering algorithm for document clustering. Document representation is animpor...
Investigating the Impact of Secure Image Transmission over MIMO-OFDM System
Abstract: The paper implements secure MIMO-OFDM systems to achieve the data confidentiality using the following three different cryptographic techniques, namely, AES block cipher, RC4 stream cipher and the proposed Parti...
Sequential Pattern Tree Mining
Sequential pattern mining, which discovers the correlation relationships from the ordered list of events, is an important research field in data mining area. In our study, we have developed a Sequential Patter...