Search Results - (( exploring crowd function algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Midrange exploration exploitation searching particle swarm optimization with HSV-template matching for crowded environment object tracking by Nurul Izzatie Husna, Muhamad Fauzi

    Published 2023
    “…In this algorithm, the worst particle will be relocating to a new position to ensure the concept of exploration and exploitation remains in the search space. …”
    Get full text
    Get full text
    Thesis
  2. 2

    The Hybrid of WOABAT-IFDO Optimization Algorithm and Its Application in Crowd Evacuation Simulation by Hamizan, Sharbini, Roselina, Sallehuddin, Habibollah, Haron

    Published 2023
    “…The performance of the new hybrid optimization algorithm is verified using standard classical test function and further evaluated with other four renowned optimization algorithms and the results showed that it is better in most cases compared with the existing algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  3. 3

    Enhanced multi-objective evolutionary mating algorithm with improved crowding distance and levy flight for optimizing comfort index and energy consumption in smart buildings by Muhammad Naim, Nordin, Mohd Herwan, Sulaiman, Nor Farizan, Zakaria, Zuriani, Mustaffa

    Published 2025
    “…The proposed MOEMA enhances the original EMA framework through two key innovations: an improved crowding distance function inspired by the Non-dominated Sorting Genetic Algorithm (NSGA) to enhance solution diversity and selection pressure, and the integration of Levy flight mechanics to improve exploration efficiency by balancing local and global searches. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development of a motion planning and obstacle avoidance algorithm using adaptive neuro fuzzy inference system for mobile robot navigation by Muslim, Farah Kamil Abid

    Published 2017
    “…These come from high dimensions of the exploration of space, geometrical and kinematic features of the obstacles. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item