Search Results - (( using vector error algorithm ) OR ( basic optimization path algorithm ))

Refine Results
  1. 1

    Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah by Hanafiah, Sukri

    Published 1997
    “…The comparison between euler's path and Bipartite graph Algorithm [14] will be made at the end this of this report to see which one give optimal chaining .…”
    Get full text
    Get full text
    Thesis
  2. 2

    Particle swarm optimization (PSO) for CNC route problem by Nur Azia Azwani, Ismail

    Published 2002
    “…The algorithm used in this project is the Global Best (gbest) algorithm where it is a basic algorithm of Particle Swarm Optimization which applicable the shortest time and path of CNC machine to complete the process of drilling. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm by Machmudah, Affiani, Parman, Setyamartana, Abbasi, Aijaz, Solihin, Mahmud Iwan, Abd Manan, Teh Sabariah, Beddu, Salmia, Ahmad, Amiruddin, Wan Rasdi, Nadiah

    Published 2021
    “…To solve the redundancy resolution, meta-heuristic optimizations, namely Genetic Algorithm (GA) and Whale Optimization Algorithm (WOA), are applied to search optimal trajectories inside local orientation angle boundaries. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    SNR-Based OLSR Routing Protocol for Wireless Mesh Networks by Elobaid, Mohamed Elshaikh

    Published 2009
    “…Unfortunately the routing protocols used such as AODV and Dynamic source routing (DSR) are hop count-based; where the routing algorithm uses the number of nodes to determine the optimum path to the destination. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim by Hashim, Siti Zuraifah

    Published 2007
    “…It makes use of three basic operations in order to optimize this problem. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Path planning algorithm for a car like robot based on MILP method by Mohd Sadri, Mohd Pawzi

    Published 2013
    “…This project is presents an algorithm for path planning optimal routes mobile robot “like a car” to a target in unknown environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman by Abd Rohaman, Muhammad Syurahbil

    Published 2020
    “…This study shows that Basic Theta* is able to produce the true shortest path compared to A* which produced slightly longer path. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment by Nurul Atikah Janis

    Published 2018
    “…Jump Point Search is one of the path finding algorithm with huge advantage of maintaining zero memory overhead as no preprocessing process involved. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Enhanced artificial bee colony-least squares support vector machines algorithm for time series prediction by Zuriani, Mustaffa

    Published 2014
    “…The lvABC algorithm is introduced to overcome the local optima problem by enriching the searching behaviour using Levy mutation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Web Algorithm search engine based network modelling of Malaria Transmission by Eze, Monday Okpoto

    Published 2013
    “…There are observed cases of attempting vector control on a trial and errors basis, with no scientific way of determining the locations of critical vector densities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Power plant energy predictions based on thermal factors using ridge and support vector regressor algorithms by Afzal, Asif, Alshahrani, Saad, Alrobaian, Abdulrahman, Buradi, Abdulrajak, Khan, Sher Afghan

    Published 2021
    “…This work aims to model the combined cycle power plant (CCPP) using different algorithms. The algorithms used are Ridge, Linear regressor (LR), and support vector regressor (SVR). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Distance vector-hop range-free location algorithm for wireless sensor network by Zazali, Azyyati Adiah

    Published 2015
    “…Distance Vector-Hop (DV-Hop) algorithm has become the focus of studies for range-free localization algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Robotic path planning using rapidly-exploring random trees by Sherwani, Fahad

    Published 2013
    “…However, the planned path by using basic RRT structure might not always be optimal in terms of path length. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Short term forecasting based on hybrid least squares support vector machines by Zuriani, Mustaffa, M. H., Sulaiman, Ernawan, Ferda, Noorhuzaimi, Mohd Noor

    Published 2018
    “…In this study, hybrid Least Squares Support Vector Machines (LSSVM) with four meta-heuristic algorithms viz. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Flood Control Distance Vector Hop (FCDV-Hop) localization in wireless sensor networks by Zazali, Azyyati Adiah, Subramaniam, Shamala, Ahmad Zukarnain, Zuriati

    Published 2020
    “…Distance Vector-Hop (DV-Hop) localization is a distributed, hop by hop positioning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Two steps hybrid calibration algorithm of support vector regression and K-nearest neighbors by Hamed, Y., Ibrahim Alzahrani, A., Shafie, A., Mustaffa, Z., Che Ismail, M., Kok Eng, K.

    Published 2020
    “…The hybrid algorithm was evaluated using a dataset of pipeline corrosion measurements collected by a Magnetic Flux Leakage (MFL) sensor (with an error margin of ±20 of the true values), and an Ultrasonic (UT) device (with an error margin of ±4). …”
    Get full text
    Get full text
    Article
  20. 20

    A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem by Arif Mandangan, Nazreen Syazwina Nazaruddin, Muhammad Asyraf Asbullah, Hailiza Kamarulhaili, Che Haziqah Che Hussin, Babarinsa Olayiwola

    Published 2024
    “…In this study, we showed that the error vector �⃗! is not unique. We proposed another error vector �⃗∗ to combat the embedding-based attacks. …”
    Get full text
    Get full text
    Get full text
    Article