Search Results - (( using optimization based algorithm ) OR ( using detection path algorithm ))

Refine Results
  1. 1
  2. 2

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
    Get full text
    Thesis
  3. 3

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…A model-driven approach was used for generating abstract test cases from the feasible paths. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A noble approach of ACO algorithm for WSN by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2018
    “…Using the proposed ACO algorithm and considering both the node mobility and the existing energy of the nodes, an optimum route and best cost from the originating node to the target node can be detected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Particle swarm optimization approach in route navigation for PoSVI-Cane by Toha, Siti Fauziah, Nordin, Nor Hidayati Diyana, Md. Zain, Mohd Zarhamdy

    Published 2023
    “…Here, Particle Swarm Optimization (PSO) path planning algorithm computes the shortest possible path based on the collection of coordinates along the pedestrian walkway. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…While the voice pattern classification will be done by using DTW algorithm. The DTW voice pattern classification module is playing a very important role as it is used to get the optimal path between the input voice and the reference voice in the database. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…While the voice pattern classification will be done by using DTW algorithm. The DTW voice pattern classification module is playing a very important role as it is used to get the optimal path between the input voice and the reference voice in the database. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A novel bio-inspired routing algorithm based on ACO for WSNs by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2019
    “…The proposed algorithm has been simulated and verified using MATLAB and the simulation results demonstrate that new ACO based algorithm achieved improved performance, about 30% improvement compared with the traditional ACO algorithm, and faster convergence to determine the best cost route, and recorded an improvement in the energy consumption of the nodes per transmission.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel by Zamri, Ruzaidi

    Published 2016
    “…To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A Feasible Architecture Of Real-Time Collision Avoidance And Path Planning For Semi-Autonomous Unmanned Ground Vehicle (Ugv) by Subramaniam, Purawin

    Published 2018
    “…Meanwhile, an Arduino Mega 2560 and ArduPilot Mega 2.6 (APM) are used as microcontrollers for obstacle avoidance and path optimization purpose respectively. …”
    Get full text
    Get full text
    Monograph
  15. 15

    A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan by Nauman , Khan

    Published 2024
    “…PMTRF modules and their algorithms enable the isolation of the maintenance switch and the selection of the most reliable path for future affected flows based on input time provided by the administrator. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A real-time integrated fire detection and alarm (FDA) system for network based building automation by Anwar, Farhat, Islam, Rounakul, Hussain, Sabahat, Rashid, Muhammad Mahbubur, Shaikh, Zuhaib

    Published 2017
    “…Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Object tracing from synthetic fluid spray through instance segmentation by Md Refat Khan, Pathan

    Published 2024
    “…The resulting objects were then analyzed using a customized nearest neighbor algorithm to calculate their correspondence between frames and a BFS algorithm was used to trace their movement path. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Automated density and growth estimation in precision aquaculture systems for prawn cultivation using computer vision techniques by Chong, Xiao Wei

    Published 2024
    “…By employing the state-of-the-art You Only Look Once (YOLO) v7 object detection algorithm, the project aims to develop a system capable of accurately detecting and classifying prawns based on their growth stages. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose by Azizan, Anis Natasha

    Published 2019
    “…Meanwhile, an Arduino Mega 2560 (Controller) is used as microcontroller for obstacle avoidance and path optimization purpose respectively. …”
    Get full text
    Get full text
    Monograph