Search Results - (( disaster information using algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    A Hybrid K-Means Hierarchical Algorithm for Natural Disaster Mitigation Clustering by Prasetyadi, Abdurrakhman, Nugroho, Budi, Tohari, Adrin

    Published 2022
    “…Cluster methods such as k-means have been widely used to group areas with a relatively equal number of disasters to determine areas prone to natural disasters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Analysing machine learning models to detect disaster events using social media by Faris Azni Azlan, Mr.

    Published 2023
    “…During disasters, people communicate to inform and request for support for themselves or their community. …”
    text::Thesis
  3. 3

    Ascertaining trust of information transmitted during a disaster by Yusoff, Y., Bakar, A.A., Aziz, N., Ismail, R., Ramli, R.

    Published 2016
    “…However, these ease of communication created one critical issue that is the reliability of the transmitted information. One of the potential solutions is to use trust algorithm to identify the trusted information. …”
    Get full text
    Get full text
    Article
  4. 4

    Ascertaining trust of information transmitted during a disaster by Yusoff, Y., Bakar, A.A., Aziz, N., Ismail, R., Ramli, R.

    Published 2016
    “…However, these ease of communication created one critical issue that is the reliability of the transmitted information. One of the potential solutions is to use trust algorithm to identify the trusted information. …”
    Get full text
    Get full text
    Article
  5. 5

    Ascertaining trust of information transmitted during a disaster by Yusoff Y., Bakar A.A., Aziz N., Ismail R., Ramli R.

    Published 2023
    “…However, these ease of communication created one critical issue that is the reliability of the transmitted information. One of the potential solutions is to use trust algorithm to identify the trusted information. …”
    Article
  6. 6
  7. 7
  8. 8
  9. 9

    Efficient multi-UAV coordination via rl: joint path planning and task scheduling for post-disaster UAV-assisted MEC systems by Adnan, Mohd Hirzi, Ahmad Zukarnain, Zuriati, Subramaniam, Shamala K.

    Published 2025
    “…Meanwhile, task scheduling is optimized using a greedy algorithm to reduce computational complexity, and UAVs cooperate through information sharing to achieve robust performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Workload performance evaluation of large spatial database for DSS based disaster management by Rohman, Muhammad Syaifur

    Published 2017
    “…Data recorded in the shortest path analysis process reveals that the evaluation and the prediction on workload performance of shortest path analysis using Dijkstra algorithm has been well implemented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System by Chiu Shoon, Sia

    Published 2024
    “…Due to this, this research focuses on building improved Channel assignments on Vehicular Ad-hoc Sensor Network (VASNET) to investigate the proposed algorithms and methods to improve the reliability of the Disaster Management System (DMS) during emergency operations for natural and man�made disasters. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A Query-Driven Spatial Data Warehouse Conceptual Schema For Disaster Management by Kamal Bahrain, Safiza Suhana

    Published 2016
    “…Outputs from the formalization process are used with a schema algorithm to effectively derive a generalized schema. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Comparison between pixel-based and object based classifications using radar satellite image in extracting massive flood extent at northern region of Peninsular Malaysia by Abd Manaf, Syaifulnizam, Mustapha, Norwati, Mohd Shafri, Helmi Zulhaidi, Sulaiman, Md. Nasir, Husin, Nor Azura

    Published 2015
    “…TerraSAR-X image was used to map the flood extent of the study area. In object-based approach, there were three simple machine learning algorithms such as PP, MD, MH together with NN performed with high accuracy while in pixel based approach, NN was the highest accuracy of all machine learning algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Comparison between pixel-based and object-based classifications using radar satellite image in extracting massive flood extent at northern region of Peninsular Malaysia by Abd Manaf, Syaifulnizam, Mustapha, Norwati, Mohd Shafri, Helmi Zulhaidi, Sulaiman, Md Nasir, Husin, Nor Azura

    Published 2015
    “…From the flood extent information, the collaboration of government, private sector, Non Governmental Organization (NGO) and community are needed to play the appropriate role in managing flood damage especially at the highly affected area and thus prevent loss of human live.Besides that, the authority could take action plan for pre-disaster, during and post-disaster caused by flooding.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Development of IoT-based automated dynamic emergency response system against fire incidents in academic building by Al-Hady, Syed Mohammed Zakaria, Islam, Md Rafiqul, Rashid, Muhammad Mahbubur

    Published 2023
    “…By leveraging the power of IoT technology, machine learning algorithms and BIM, the proposed system aims to reduce the impact of fire disasters by providing accurate and timely information, route optimization and facilitating effective evacuation and rescue efforts. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Google the earth: what's next? by Mansor, Shattri

    Published 2010
    “…Maps are essential at all stages of infrastructure development, resource planning and the disaster management cycle. Satellite imagery/data can be used for everything from ground truthing and change detection, to more sophisticated analyses, including feature extraction and natural hazard prediction. …”
    Get full text
    Get full text
    Get full text
    Inaugural Lecture
  18. 18

    Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks by Sanni, Mistura Laide, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Anwar, Farhat, Ahmed, Gharib Subhi Mahmoud

    Published 2015
    “…Mobile multicast scenarios emerge in group-based distribution of information such as obtains in the health sector, disaster recovery operation, remote bus, train control and video surveillance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Extended spatial decision tree algorithm for classifying hotspot occurrence by Sitanggang, Imas Sukaesih

    Published 2013
    “…The method is an extension of the existing spatial decision tree algorithm which works on polygon features only. The proposed algorithm uses spatial information gain to choose the best splitting layer from a set of explanatory layers. …”
    Get full text
    Get full text
    Thesis