Search Results - (( developers exploring concerns algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Efficient terrain coverage for deploying wireless sensor nodes on multi-robot system by Arezoumand, Reza, Mashohor, Syamsiah, Marhaban, Mohammad Hamiruce

    Published 2016
    “…One of solution for this problem is using mobile robots with concern on exploration algorithm for mobile robot. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm by Arezoumand, Reza

    Published 2015
    “…One of the solutions to this problem is by using mobile robots with concern on exploration algorithm for mobile robot. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Comprehensive review of drones collision avoidance schemes: challenges and open issues by Rezaee, Mohammad Reza, Abdul Hamid, Nor Asilah Wati, Hussin, Masnida, Ahmad Zukarnain, Zuriati

    Published 2024
    “…Moreover, the inherent limitations of drones, namely constraints on energy consumption, data storage capacity, and processing power, present formidable obstacles in developing collision avoidance algorithms. This review paper explores the challenges of ensuring safe drone operations, focusing on collision avoidance. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Mobile robot path optimization algorithm using vector calculus and mapping of 2 dimensional space by Zahari, Ammar, Ismail , Amelia Ritahani, Desia, Recky

    Published 2015
    “…A simulated robot in a simulated environment is used to test the algorithm that is to be developed. The simulated robot is equipped with a sonar sensor and several infrared sensors on its chassis. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Improved Bat Algorithm for faster convergence in solving optimisation problem by Ramli, Mohamad Raziff

    Published 2021
    “…Besides that, IBA was found comparable with existing variants of BA such as the IBA developed from the previous researcher in the year 2013 and the Hybrid Self-Adaptive Bat Algorithm (HSABA) developed in the year 2014. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Robotic path planning using rapidly-exploring random trees by Sherwani, Fahad

    Published 2013
    “…This study concerns the implementation of Rapidly-Exploring Random Trees (RRTs) algorithm for an autonomous robot path planning. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Multi-Agent cubature Kalman optimizer: A novel metaheuristic algorithm for solving numerical optimization problems by Zulkifli, Musa, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai

    Published 2024
    “…CTT can use small values for parameters P(0), Q, and R, so CKF was developed to overcome KF and other estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Artificial intelligence (AI) and its application in architecture design: a thematic review by Jin, Deran, Zairul, Mohd, Salih, Sarah Abdulkareem

    Published 2025
    “…It has broad implications across various industries, sparking extensive debates on AI’s potential, a concern particularly resonant within the architectural design industry. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm by Mohammed Abdullah, Abdullah Nasser

    Published 2018
    “…In line with the emerging field called Search based Software Engineering, many recently developed t-way strategies have adopted meta-heuristic algorithms as the basis of their implementations such as Simulated Annealing, Genetic Algorithm, Ant Colony Optimization Algorithm, Particle Swarm Optimization, Harmony Search and Cuckoo Search, owing their superior performance in term of test size reduction as compared to general computational based strategies, such as General t-way, Test Vector Generator, In Parameter Order General, Jenny, and Automatic Efficient Test Generator. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Sentiment analysis regarding childcare issues using Naive Bayes Algorithm / Alis Farhana Zulkipeli by Zulkipeli, Alis Farhana

    Published 2025
    “…However, the lack of comprehensive methodologies poses challenges for policymakers, childcare providers, and researchers in understanding public concerns and developing effective interventions. To address this, a dataset of 1,079 tweets from X (formerly Twitter) is analyzed. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Exploring the effect of shape parameters on font design using rational quadratic trigonometric curves by Sarkam, Nor Aslily, Azhari, Nur Ain Fitrah, Nor-Al-Din, Siti Musliha, Mohamad Sukri, Nursyazni

    Published 2025
    “…While AI integration enhances learning efficiency and accessibility, ethical concerns such as data privacy, algorithmic bias, and academic integrity remain critical challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Evaluation of Security Metric for Artificial Internet of Things Smart Locking System by Siti Nur Hanani, Mohd Rizal

    Published 2023
    “…In terms of hardware implementation, a microcontroller is chose, and a testing environment is established to explore and enhances security measures. This thesis outlines the architectural model of the smart locking system, the design of the face recognition algorithm, and the development of face recognition reader using the Raspberry Pi 3 model B microcontroller. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing by S. Ahmed, Bestoun

    Published 2011
    “…Many AI-based strategies have been developed, such as Ant Colony, Simulated Annealing, Genetic Algorithm, and Tabu Search. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…Clustering in WSNs is a reliable method of effectively transferring data within the network through routing. Thus, developing an effective routing algorithm to optimize network functionality is a big concern. …”
    Article
  20. 20