Search Results - (( _ evacuation path algorithm ) OR ( its verification based algorithm ))*
Search alternatives:
- verification based »
- its verification »
- path algorithm »
- evacuation »
-
1
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…The objective is to design and develop an evacuation route using shortest path algorithm based on the evacuation map of the building. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Simulation method of shortest and safest path algorithm for evacuation in high rise building
Published 2014“…The objectives of this research are to identify the suitable shortest and safest path algorithm for evacuation, and followed by design and develop an evacuation preparedness model simulation via shortest path algorithm to choose a suitable exit route to evacuate the evacuees. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Modification of dijkstra's algorithm for safest and shortest path during emergency evacuation
Published 2015“…The example is presented to compare the result obtained using the modified algorithm. Thus, it reveals the effectiveness of the modification in determining the best path for the evacuation process.…”
Get full text
Get full text
Get full text
Article -
4
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Revolutionizing crowd safety: A breakthrough hybrid whale-bat chaotic algorithm (WOABCM) for optimized evacuation simulations
Published 2024“…The Whale-Bat Chaotic Algorithm (WOABCM) is a revolutionary tool for optimizing pathfinding navigation in crowd evacuation scenarios. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
The Hybrid of WOABAT-IFDO Optimization Algorithm and Its Application in Crowd Evacuation Simulation
Published 2023“…Ultimately, the algorithm’s performance also has been tested in crowd simulation evacuation that involves a different number of agents and with/without obstacle scenario. …”
Get full text
Get full text
Get full text
Proceeding -
7
Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model
Published 2025“…The communication model is added to the simulation model to demonstrate the use of word-of-mouth during evacuation. A role selection algorithm chooses the leader before the evacuation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
Stroke-to-stroke matching in on-line signature verification
Published 2010“…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
Get full text
Get full text
Thesis -
10
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
11
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
12
Aplikasi Algoritma Dijkstra dalam Penyelesaian Berbagai Masalah
Published 2021“…The application of Dijkstra's Algorithm in everyday life is very diverse. This study collects research results regarding the application of Dijkstra's Algorithm to solve everyday problems such as the shortest path problem, this mini-review paper can explain the study of Dijkstra's Algorithm for various things, including solving bi-objective shortest routes, multi-objective routes, emergency evacuation, Dijkstra's graph, the connection between LBS features, best route distribution, and fuzzy solution.…”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
-
15
-
16
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The literature proposes that an agent changes or updates its norms based on the variables of the local environment and the amount of thinking about its behaviour. …”
Short Survey -
17
Halal product checker: real time ingredient verification application using mobile text scanning
Published 2025“…The Halal Product Checker: Real-Time Ingredient Verification Application Using Text Scanning is an OCR (Optical Character Recognition) technology-based mobile application created to assist Muslims in ascertaining whether the ingredients in foods are halal. …”
Get full text
Get full text
Student Project -
18
Finger vein verification
Published 2009“…This trait offers a higher security because for gery is extremely difficult. The finger vein verification project verifies a person‟s identity based on the vein patterns. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
19
-
20
