Search Results - (( develop looking selection algorithm ) OR ( java optimization path algorithm ))
Search alternatives:
- selection algorithm »
- java optimization »
- optimization path »
- develop looking »
- path algorithm »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
2
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
3
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
System identification using Extended Kalman Filter
Published 2017“…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
Get full text
Get full text
Student Project -
6
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
7
-
8
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…This study looks at developing a behavior-based algorithm that adaptable to several different environment configurations. …”
Get full text
Get full text
Final Year Project -
9
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
Get full text
Get full text
Thesis -
10
Scentopia: Navigating the World of Fragrance
Published 2024“…In order to improve user experiences, the study looks into user preferences and fragrance selection criteria through research and analysis. …”
Get full text
Get full text
Final Year Project -
11
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
12
Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman
Published 2024“…This research significantly contributes to the understanding of machine learning applications in the context of COVID-19 outbreak prediction, emphasizing the importance of algorithm and configuration selections for robust forecasting. …”
Get full text
Get full text
Thesis -
13
Real-time personal protective equipment compliance detection using you only look once
Published 2024“…The proposed research work employs the system of object detection from CCTV videos around the working sites of company XYZ through a framework that includes image acquisition, data collection, and video data pre-processing, with the implementation of various deep learning algorithms using state-of-the-art models such as You Only Look Once (YOLO) including YOLOv5, YOLOv7, and YOLOv8. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Video surveillance: Item monitoring against theft
Published 2023“…Besides, the conventional one would rely on human operators to be constantly observing the scenes captured so that crimes could be discovered earlier and therefore prevented. Here, we have developed an intelligent video surveillance system that is capable of identifying the close loitering event and monitoring the select item in the scene by integrating these approaches, such as the You-Only-Look-Once (YOLO) version 5 object detection algorithm, close-contact detection, feature matching, significant movement and dissimilarity detections. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Optimization and selection of maintenance policies in an electrical gas turbine generator based on the hybrid reliability-centered maintenance (RCM) model
Published 2020“…The electrical generation industry is looking for techniques to precisely determine the proper maintenance policy and schedule of their assets. …”
Get full text
Get full text
Get full text
Article -
16
Handbook of Machine Learning for Computational Optimization: Applications and Case Studies
Published 2021“…This handbook focuses on new machine learning developments that can lead to newly developed applications. …”
Get full text
Get full text
Book -
17
Decision tree and rule-based classification for predicting online purchase behavior in Malaysia / Maslina Abdul Aziz, Nurul Ain Mustakim and Shuzlina Abdul Rahman
Published 2024“…The result indicated that the highest accuracy of 89.34% was achieved by the Random Tree algorithm, while the rule-based algorithm PART reached an accuracy of 87.56%. …”
Get full text
Get full text
Article -
18
Real-time automated road damages inspection using deep convolutional neural networks
Published 2023“…Thousands of images from selected dataset are trained using You Only Look Once (YOLO) v4 algorithm which based on Convolutional Neural Network (CNN). …”
Get full text
Get full text
Get full text
Article -
19
Secured HF image transmission system
Published 2006“…Communications is no longer limited to voice and telegraphy, but now include applications such as email, text messaging, image, and telemetry. This project looks into the design and development of an image transmission system that for use in the HF radio frequency spectrum. …”
Get full text
Get full text
Monograph -
20
Development of reliability-centered maintenance model using linguistic failure mode and effect analysis
Published 2019“…Likewise, current developments in the RCM models are struggling to solve the drawbacks of the traditional RCM, but prioritization of risk factors, multi-objective optimization, and policy selection of maintenance are neglected. …”
Get full text
Get full text
Thesis
