Search Results - (( _ evacuation a algorithm ) OR ( user identification system algorithm ))

Refine Results
  1. 1

    High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm by Mohd Sabri, Nor Amalina

    Published 2015
    “…This research aims to assist the evacuees to find the shortest path in a high rise building using a shortest path algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Thus, the systems return irrelevant user search intentions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5
  6. 6

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Evacuation wayfinding is the process of route/pathfinding or searching from one location to a safety destination. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Applied Artificial Bee Colony Optimization Algorithm in Fire Evacuation Routing System by Wang, Chen, Wood, Lincoln Christopher, Li, Heng, Aw, Zhenye, Keshavarzsaleh, Abolfazl

    Published 2018
    “…This study aims to develop a fire evacuation routing model "Bee-Fire" using artificial bee colony optimization (BCO) and to test the routing model through a simulation run. …”
    Get full text
    Get full text
    Article
  8. 8

    The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims by Che Pa, Noraziah, Hashim, Nor Laily, Yusof, Yuhanis, Hussain, Azham

    Published 2016
    “…Flood evacuation centre is defined as a temporary location or area of people from disaster particularly flood as a rescue or precautionary measure. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…The systems focus on user query representation, user search intention identification and ranking algorithms to improve keyword search. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters by Abusalama, Jawad

    Published 2025
    “…These approaches were rigorously evaluated against Andrea’s algorithm and a Genetic Algorithm, revealing competitive advantages. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Simulation method of shortest and safest path algorithm for evacuation in high rise building by Mohd Sabri, Nor Amalina, Hasan Basari, Abd Samad, Hussin, Burairah, Abu Samah, Khyrina Airin Fariza

    Published 2014
    “…The objectives of this research are to identify the suitable shortest and safest path algorithm for evacuation, and followed by design and develop an evacuation preparedness model simulation via shortest path algorithm to choose a suitable exit route to evacuate the evacuees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    The Hybrid of WOABAT-IFDO Optimization Algorithm and Its Application in Crowd Evacuation Simulation by Hamizan, Sharbini, Roselina, Sallehuddin, Habibollah, Haron

    Published 2023
    “…Ultimately, the algorithm’s performance also has been tested in crowd simulation evacuation that involves a different number of agents and with/without obstacle scenario. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  13. 13
  14. 14

    The banjir rescue: an IoT-based flood evacuation center system / Nur Aliah Syamsurial by Syamsurial, Nur Aliah

    Published 2020
    “…Finally, the selection is made where the algorithm will choose the nearest evacuation center to the victims. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…Fault Detection and Identification (FDI) monitor, identify, and pinpoint the type and location of system fault in a complex multiple input multiple output (MIMO) non-linear system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Banjir rescue: IOT-based flood evacuation center / Nor Azimah Khalid ... [et al.] by Khalid, Nor Azimah, Syamsurial, Nur aliah, Mohamed Noor, Noorhayati, Abdullah, Shapina

    Published 2025
    “…Finally, the selection is made where the algorithm will choose the nearest evacuation center to the victims. …”
    Get full text
    Get full text
    Article
  18. 18

    Flash flood evacuation with discrete particle swarm optimization / Marina Yusoff by Yusoff, Marina

    Published 2011
    “…A discrete particle swarm optimization (DPSO) algorithm is proposed to solve the EVRP and the EVRP. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…The systems are increasingly employed into business, trading and living fields for automatic personal identification. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…This project implements an iris recognition algorithm as a biometric identification. There is a need for reliable and security identification since typical identification methods using identity cards, passwords, and user name possess threats to the security of an organization because of human error. …”
    Get full text
    Get full text
    Final Year Project