Search Results - (( parameter detection method algorithm ) OR ( using normalization path algorithm ))
Search alternatives:
- parameter detection »
- normalization path »
- method algorithm »
- path algorithm »
-
1
Modelling of multi-robot system for search and rescue
Published 2023“…It was found that the number of populations set to 75 and dynamically adjusts the value of inertial weight, the cognitive and social parameter provides the best performance in terms of shortest path length and execution time. In conclusion, this project shows that the MPSO algorithm is capable of generating a better path compared to the normal PSO algorithm in terms of average path length and execution time, making it a promising algorithm for multi-robot path planning in dynamic environments.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Design and analysis of sequence generator module using eulerian path algorithm for DNA fragment assembly / Mustaqim Mohd Subri
Published 2013“…This project is to design and analysis the sequence generator module using Eulerian Path algorithm for DNA fragment assembly. …”
Get full text
Get full text
Student Project -
3
Optimal path planning algorithms in virtual environments
Published 2006“…In relation to that, A* algorithm was used as a path finding technique to plan a collision-free-path journey from one location to another. …”
Get full text
Get full text
Thesis -
4
Design and analysis of sequence generator module using eulerian path algorithm for DNA fragment assembly: article / Mustaqim Mohd Subri
Published 2013“…Euler Path Algorithm is used since it has better assembling ability especially in assembling long sequence. …”
Get full text
Get full text
Article -
5
-
6
-
7
-
8
GPS boundary navigation of DrosoBots using MATLAB simulation
Published 2010“…To implement this, region recognition and several path planning algorithms have been utilized. Besides that, pixilation of path is also used to estimate the coverage of the path planning. …”
Get full text
Get full text
Proceeding Paper -
9
-
10
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
11
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017“…In network theory, it’s known as the shortest-path problem, and Dijkstra’s algorithm is usually used to solve it. …”
Get full text
Get full text
Thesis -
12
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
13
Adaptive route optimization for mobile robot navigation using evolutionary algorithm
Published 2021“…For example, Ant Colony Optimization (ACO) is an optimization algorithm based on swarm intelligence which is widely used to solve path planning problem. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
14
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
15
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
16
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
17
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
19
Scheduling tight deadlines for scientific workflows in the cloud
Published 2018“…This article will evaluate the performance of the Proportional Deadline Constrained (PDC) algorithm using Cloudsim and compare it with the Deadline Constrained Critical Path (DCCP) scheduling algorithm. …”
Get full text
Get full text
Thesis -
20
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
Get full text
Get full text
Get full text
Article
