Search Results - (( initial detection path algorithm ) OR ( using codification based algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2

    MOBILE ROBOT by ABU KASSIM, ABU MASNUR

    Published 2004
    “…Extended functions of the microcontroller is to create a 2Dterrain map, and plan its path to any specified target point. These are to be achieved by Voronoi Diagram or Delaunay Triangulation method for mapping, and a combination of one or more of the Dijkstra, Bellman, Ford, Moore, Johnson, Floyd-Warshal, or A* algorithms for best path calculation. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Sensor based line follower self-driving car (sCar) with Obstacles Avoidance by Md Nazrul Islam, Jaime Gallardo-Alvarado, Othman bin Ahmad, Ali Farzamnia, Zakariah Aris

    Published 2016
    “…We develop a Collision Avoidance path-planning Algorithm (CAA) for dual motors controller line follower sCar that has ability for navigate collision avoidance path autonomously through a constraint track from initial position to goal position. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Obstacle detection technique using multi sensor integration for small unmanned aerial vehicle by Ramli, Muhammad Faiz, Shamsudin, Syariful Syafiq, Legowo, Ari

    Published 2017
    “…In the experiment conducted, we successfully detect and determine a safe avoidance path for the UAV on 6 different sizes and textures of the obstacles including textureless obstacles…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Safe avoidance region detection for unmanned aerial vehicle using cues from expansion of feature points by Ramli, Muhammad Faiz, Sutjipto, Agus G.E., Sulaeman, Erwin, Ari Legowo, Ari Legowo

    Published 2024
    “…A robust system should be able to not only detect obstacles but the free region for the avoidance path as well. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Whenever there are significant changes in signal levels detected, server will initiate database reconstruction procedure. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Object tracing from synthetic fluid spray through instance segmentation by Md Refat Khan, Pathan

    Published 2024
    “…The resulting objects were then analyzed using a customized nearest neighbor algorithm to calculate their correspondence between frames and a BFS algorithm was used to trace their movement path. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani by Mirhassani, Seyedmostafa

    Published 2015
    “…Three speech databases were used for the experiments including prolonged Malay vowels and Malay continuous speech database based on children’s speech and TIMIT database based on adult speeches. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of mapping methods for seagrass meadows in Malaysia by using landsat images by Hossain, Mohammad Shawkat

    Published 2015
    “…ME improved visual interpretation of Landsat images for seagrass detection and distribution mapping of Merambong shoal (MS), Tanjung Adang Darat shoal (TADS), TALS, and Seluyong mudflat (SMF). …”
    Get full text
    Get full text
    Thesis