Search Results - (( using evaluation path algorithm ) OR ( using function path algorithm ))

Refine Results
  1. 1
  2. 2

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
    Get full text
    Get full text
    Thesis
  3. 3

    All-pass filtered x least mean square algorithm for narrowband active noise control by Mondal (Das), Kuheli, Das, Saurav, Abu, Aminudin, Hamada, Nozomu, Toh, Hoong Thiam, Das, Saikat, Faris, Waleed Fekry

    Published 2018
    “…Recently several new ANC algorithms have been developed; in which there is no requirement for the modelling of the secondary path transfer function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity by Dehkordi, Sepehr Ghasemi

    Published 2014
    “…The proposed THF-NLFXLMS algorithm models the Wiener secondary path and applies the estimated degree of nonlinearity of the nonlinear secondary path in the control algorithm design. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…A model-driven approach was used for generating abstract test cases from the feasible paths. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…The algorithms are evaluated using 30 benchmark functions of the CEC2014 benchmark suite, and then applied to solve PCB drill path optimization case study. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Attack path selection optimization with adaptive genetic algorithms by Abd Rahman, A.S., Zakaria, M.N., Masrom, S.

    Published 2016
    “…We describe our approach for implementing an optimized security assessment using Genetic Algorithm (GA). Because of the dynamic nature of an enterprise network, all security analysis tools devised for the network need to function in dynamic mode as well. …”
    Get full text
    Get full text
    Article
  8. 8

    Attack path selection optimization with adaptive genetic algorithms by Abd Rahman, A.S., Zakaria, M.N., Masrom, S.

    Published 2016
    “…We describe our approach for implementing an optimized security assessment using Genetic Algorithm (GA). Because of the dynamic nature of an enterprise network, all security analysis tools devised for the network need to function in dynamic mode as well. …”
    Get full text
    Get full text
    Article
  9. 9

    Nonlinear THF-FXLMS algorithm for active noise control with loudspeaker nonlinearity by Ghasemi, Sepehr, Raja Ahmad, Raja Mohd Kamil, Marhaban, Mohammad Hamiruce

    Published 2016
    “…The proposed THF-NLFXLMS algorithm, models the nonlinear secondary path and applies the estimated degree of nonlinearity in the control algorithm design. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Levy slime mould algorithm for solving numerical and engineering optimization problems by J. J., Jui, M. A., Ahmad, M. I. M., Rashid

    Published 2022
    “…We took advantage of the Levy flight, which solved the local optima problem and improved traditional SMA efficiency. The proposed LSMA algorithm performance was evaluated using 23 well-known benchmark test functions, namely unimodal benchmark functions, multimodal benchmark functions, and fixed-dimension multimodal benchmark functions, as well as compared with the traditional SMA. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    STITCH-256: A dedicated cryptographic hash function by Jamil N., Mahmod R., Z'aba M.R., Udzir N.I., Zukarnain Z.A.

    Published 2023
    “…Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. …”
    Article
  14. 14

    The Hybrid of WOABAT-IFDO Optimization Algorithm and Its Application in Crowd Evacuation Simulation by Hamizan, Sharbini, Roselina, Sallehuddin, Habibollah, Haron

    Published 2023
    “…The performance of the new hybrid optimization algorithm is verified using standard classical test function and further evaluated with other four renowned optimization algorithms and the results showed that it is better in most cases compared with the existing algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  15. 15

    The solution of 2048 puzzle game using A* algorithm / Zafhira Ismail by Ismail, Zafhira

    Published 2017
    “…This project use usability test for user testing system and functionality test to evaluate the efficiency of the game. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Optimum Feeder Routing and Distribution Substation Placement and Sizing using PSO and MST by Hasan, Ihsan Jabbar, Gan, Chin Kim, Shamshiri, Meysam, Ab Ghani, Mohd Ruddin, Omar, Rosli

    Published 2014
    “…This paper proposes an algorithm to find the optimum distribution substation placement and sizing by utilizing the PSO algorithm and optimum feeder routing using modified MST. …”
    Get full text
    Get full text
    Article
  19. 19

    Performance evaluation of heuristic methods in solving symmetric travelling salesman problems by Lim, Yai-Fung, Hong, Pei Yee, Ramli, Razamin, Khalid, Ruzelan, Baten, Md Azizul

    Published 2016
    “…Their performances were compared and the appropriate algorithm for solving TSPs was then identified. The solution quality was evaluated using empirical testing, benchmark solutions and probabilistic analyses. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Development of a motion planning and obstacle avoidance algorithm using adaptive neuro fuzzy inference system for mobile robot navigation by Muslim, Farah Kamil Abid

    Published 2017
    “…After this, the third objective of the research is planning in a crowded complex situation to evaluate the risk of collision between the robot and the obstacle’s trajectory using a fuzzy logic controller. …”
    Get full text
    Get full text
    Get full text
    Thesis