Search Results - (( _ evacuation path algorithm ) OR ( based verification system algorithm ))*
Search alternatives:
- verification system »
- based verification »
- system algorithm »
- path algorithm »
- evacuation »
-
1
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…The objective is to design and develop an evacuation route using shortest path algorithm based on the evacuation map of the building. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Simulation method of shortest and safest path algorithm for evacuation in high rise building
Published 2014“…The objectives of this research are to identify the suitable shortest and safest path algorithm for evacuation, and followed by design and develop an evacuation preparedness model simulation via shortest path algorithm to choose a suitable exit route to evacuate the evacuees. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Modification of dijkstra's algorithm for safest and shortest path during emergency evacuation
Published 2015“…The example is presented to compare the result obtained using the modified algorithm. Thus, it reveals the effectiveness of the modification in determining the best path for the evacuation process.…”
Get full text
Get full text
Get full text
Article -
4
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Revolutionizing crowd safety: A breakthrough hybrid whale-bat chaotic algorithm (WOABCM) for optimized evacuation simulations
Published 2024“…The Whale-Bat Chaotic Algorithm (WOABCM) is a revolutionary tool for optimizing pathfinding navigation in crowd evacuation scenarios. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
The Hybrid of WOABAT-IFDO Optimization Algorithm and Its Application in Crowd Evacuation Simulation
Published 2023“…Ultimately, the algorithm’s performance also has been tested in crowd simulation evacuation that involves a different number of agents and with/without obstacle scenario. …”
Get full text
Get full text
Get full text
Proceeding -
7
Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model
Published 2025“…The communication model is added to the simulation model to demonstrate the use of word-of-mouth during evacuation. A role selection algorithm chooses the leader before the evacuation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
10
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…Principal Component Analysis (Pca) Is Utilized In This System. The Proposed Cp Estimation Algorithm Is Based On The Alteration Tracking (At) Followed By An Estimation Algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. …”
Get full text
Get full text
Get full text
Article -
12
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Therefore, the aim for this project is to develop a new approach in the fingerprint verification system by applying Clonal Selection Algorithm (CSA) that is known to be good in pattern matching and optimization of problems. …”
Get full text
Get full text
Thesis -
13
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
14
-
15
-
16
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Offline signature verification using artificial neural network / Mohd Hafiz Hilmi Abdul Ghani
Published 2012“…As a result of this project, the system successfully verifies the signature based on the Neural Network algorithm. …”
Get full text
Get full text
Thesis -
18
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
19
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter -
20
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper
