Search Results - (( evolution optimization path algorithm ) OR ( spatial visualization _ algorithm ))

Refine Results
  1. 1

    The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment by Kok, Kai Yit

    Published 2016
    “…Significant research has been conducted on Unmanned Aerial Vehicle (UAV) path planning using evolutionary algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), and Biogeographic-Based Optimization (BBO). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of an improved GWO algorithm for solving optimal paths in complex vertical farms with multi-robot multi-tasking by Shen, Jiazheng, Hong, Tang Sai, Fan, Luxin, Zhao, Ruixin, Mohd Ariffin, Mohd Khairol Anuar, As’arry, Azizan

    Published 2024
    “…The EPDE-GWO algorithm is compared with Genetic Algorithm (GA), Simulated Annealing (SA), Dung Beetle Optimizer (DBO), and Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim by Hashim, Siti Zuraifah

    Published 2007
    “…Roadways and telephone systems are the examples of them. Genetic Algorithms (GA), pioneered by John Holland, applies the principle of evolution found in nature to the problem of finding an optimal solution. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Differential evolution optimization for constrained routing in Wireless Mesh Networks by Sanni, Mistura Laide, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Ahmed, Gharib Subhi Mahmoud, Anwar, Farhat, Zakaria, Omar

    Published 2014
    “…This solution addresses efficient and optimal routing path construction for cost and quality metrics of the application. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Literature Review of Optimization Techniques for Chatter Suppression In Machining by A. R., Yusoff, Mohamed Reza Zalani, Mohamed Suffian, Mohd Yusof, Taib

    Published 2011
    “…Various algorithms can be applied in the optimization of machining problems; however, Differential Evolution is the most appropriate for use in chatter suppression, being less time consuming, locally optimal, and more robust than both Genetic Algorithms, despite their wide applications, and Sequential Quadratic Programming, which is a famous conventional algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Comparative analysis of spiral dynamic algorithm and artificial bee colony optimization for position control of flexible link manipulators by Nor Maniha, Abdul Ghani, Nizaruddin, M. Nasir, Azrul Azim, Abdullah Hashim

    Published 2024
    “…By integrating the ABC algorithm into the manipulator's control system, the goal is to enhance its ability to plan paths and optimize trajectories. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Hybrid genetic algorithm with multi-parents recombination for job shop scheduling problems / Ong Chung Sin by Ong, Chung Sin

    Published 2013
    “…This mechanism is restricted to search the possible solutions in a critical path. Modification on the path by using neighborhood search significantly reduces the total length of the makespan. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Lightweight spatial attentive network for vehicular visual odometry estimation in urban environments by Gadipudi, N., Elamvazuthi, I., Lu, C.-K., Paramasivam, S., Su, S.

    Published 2022
    “…Traditional visual odometry algorithms require the careful fabrication of state-of-the-art building blocks based on geometry. …”
    Get full text
    Get full text
    Article
  10. 10

    Lightweight spatial attentive network for vehicular visual odometry estimation in urban environments by Gadipudi, N., Elamvazuthi, I., Lu, C.-K., Paramasivam, S., Su, S.

    Published 2022
    “…Traditional visual odometry algorithms require the careful fabrication of state-of-the-art building blocks based on geometry. …”
    Get full text
    Get full text
    Article
  11. 11

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…The IEM algorithm uses the attraction-repulsion mechanism to change the positions of solutions towards the optimality. …”
    Get full text
    Get full text
    Thesis
  12. 12

    EMAPlus-optimized adaptive convergence prescribed performance control for high-precision steering of rack steering vehicles by Addie Irawan, Hashim, Norsharimie, Mat Adam, Mohd Iskandar Putra, Azahar, Mohd Zamri, Ibrahim, Mohd Herwan, Sulaiman

    Published 2026
    “…EMAPlus is employed to jointly tune the ACPPC and AW-PI parameters, enabling fast, stable, and computationally efficient optimization compared with the original Evolutionary Mating Algorithm (EMA), Ant Lion Optimizer (ALO), and Grasshopper Optimization Algorithm (GOA). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Compacted dither pattern codes over MPEG-7 dominant colour descriptor in video visual depiction by Ranathunga, L., Zainuddin, R., Abdullah, N.A.

    Published 2010
    “…Visual description experiments were conducted for ten irregular shapes-based visual concepts in videos with three setups namely CDPC with Bhattacharyya classifier, DCD without spatial coherency and DCD with spatial coherency. …”
    Get full text
    Get full text
    Article
  14. 14

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Application of terrain analysis to the mapping and spatial pattern analysis of subsurface geological fractures of Kuala Lumpur limestone bedrock, Malaysia. by Mansor, Shattri, Mahmud, Ahmad Rodzi, Kim Huat, Bujang, Elmahdy, Samy Ismail

    Published 2012
    “…Unlike wavelet analysis and the Fourier transform, which use optical remote-sensing images, the integration of visual interpretation and a topographical fabric algorithm is capable of the extraction and spatial correlation of subsurface geological fractures. …”
    Get full text
    Get full text
    Article
  16. 16

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…The challenging issue of routing protocols is to reduce the communication overhead for data transmission by determining an optimal path. The hierarchical routing technique is one of the energy efficient routing protocols in WSN. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Pixel value differencing steganography techniques: Analysis and open challenge by Hussain, Mehdi, Wahab, Ainuddin Wahid Abdul, Anuar, Nor Badrul, Salleh, Rosli, Noor, Rafidah Md

    Published 2015
    “…Image steganography is majorly divided into spatial and frequency domains. Pixel value differencing (PVD) considered as good steganographic algorithm due to its high payload and good visual perception in spatial domain. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Challenges in multi-layer data security for video steganography by Samar Kamil, Masri Ayob, Siti Norul Huda Sheikh Abdullah, Zulkifli Ahmad

    Published 2018
    “…To overcome these problems, the cryptography and error correction codes are comes in the pictures and hybrid with steganography algorithms. The cryptography algorithms add one layer of security on steganography algorithms and error correction codes improves the robustness of steganography algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes by Shariah, Sawsan Kamel

    Published 2012
    “…Dynamic weather elements such as rain cause complex visual appearance, because rain consists of spatially distributed drops falling at high velocities. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul by Tom´As, Maul

    Published 2006
    “…The current thesis is concerned with how biological systems solve the computational problem of visual pose estimation. Four levels of analysis are traversed in order of decreasing abstraction: computational, algorithmic, implementational and formational. …”
    Get full text
    Get full text
    Thesis