Search Results - (( _ evacuation path algorithm ) OR ( traits identification based algorithm ))*

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm by Mohd Sabri, Nor Amalina

    Published 2015
    “…The objective is to design and develop an evacuation route using shortest path algorithm based on the evacuation map of the building. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Simulation method of shortest and safest path algorithm for evacuation in high rise building by Mohd Sabri, Nor Amalina, Hasan Basari, Abd Samad, Hussin, Burairah, Abu Samah, Khyrina Airin Fariza

    Published 2014
    “…The objectives of this research are to identify the suitable shortest and safest path algorithm for evacuation, and followed by design and develop an evacuation preparedness model simulation via shortest path algorithm to choose a suitable exit route to evacuate the evacuees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Modification of dijkstra's algorithm for safest and shortest path during emergency evacuation by Khyrina Airin Fariza, Abu Samah, Burairah, Hussin, Abd Samad, Hasan Basari

    Published 2015
    “…The example is presented to compare the result obtained using the modified algorithm. Thus, it reveals the effectiveness of the modification in determining the best path for the evacuation process.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    The Hybrid of WOABAT-IFDO Optimization Algorithm and Its Application in Crowd Evacuation Simulation by Hamizan, Sharbini, Roselina, Sallehuddin, Habibollah, Haron

    Published 2023
    “…Ultimately, the algorithm’s performance also has been tested in crowd simulation evacuation that involves a different number of agents and with/without obstacle scenario. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  7. 7

    Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model by Norhaida, Binti Hussain, Wai Shiang, Cheah, Wai Loke, Seng

    Published 2025
    “…The communication model is added to the simulation model to demonstrate the use of word-of-mouth during evacuation. A role selection algorithm chooses the leader before the evacuation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Furthermore, the algorithm to generate tag cloud visualization based on personality traits has not been explored. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Real time electrocardiogram identification with multi-modal machine learning algorithms by Waili, Tuerxun, Mohd Nor, Rizal, Sidek, Khairul Azami, Abdul Rahman, Abdul Wahab, Guven, Ghokan

    Published 2017
    “…Biometrics like voice, brain signal and finger print are unique human traits that can be used for identification. In this paper we present an identification system based on Electrocardiogram (heart signal). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Aplikasi Algoritma Dijkstra dalam Penyelesaian Berbagai Masalah by Rosyid Ridlo, Al Hakim, Muhammad Haikal, Satria, Yanuar Zulardiansyah, Arief, Agung, Pangestu, Ariep, Jaenul, Revita Desi, Hertin, Dian, Nugraha

    Published 2021
    “…The application of Dijkstra's Algorithm in everyday life is very diverse. This study collects research results regarding the application of Dijkstra's Algorithm to solve everyday problems such as the shortest path problem, this mini-review paper can explain the study of Dijkstra's Algorithm for various things, including solving bi-objective shortest routes, multi-objective routes, emergency evacuation, Dijkstra's graph, the connection between LBS features, best route distribution, and fuzzy solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…In this project, we want to create an age identification system that uses Convolutional Neural Network (CNN) algorithms to estimate people's ages fast and accurately from facial images. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Characterization and pathogenicity of Rhizoctonia spp isolated from various crop species in different agroecosystems in Malaysia by Rashed, Osamah Zaid Ali

    Published 2017
    “…This study investigated Rhizoctonia isolates obtained from different crops and locations based on morphological traits, pathogenicity, molecular identification and genetic diversity characterization. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Workload performance evaluation of large spatial database for DSS based disaster management by Rohman, Muhammad Syaifur

    Published 2017
    “…For example, it has been proven that Dijkstra Algorithm is able to determine the shortest and the safest path. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Security system using biometric technology: Design and implementation of voice recognition system (VRS) by A. Rashid, Rozeha, Mahalin, Nur Hija, Sarijari, Mohd. Adib, Abdul Aziz, Ahmad Aizuddin

    Published 2008
    “…In this paper, we present an implementation of a security system based on voice identification as the access control key. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    In silico approaches for unearthing bacterial quorum-sensing inhibitors against pathogenic bacteria by Pawar, Shrikant, Bramha Chari, P. V., Lahiri, Chandrajit *

    Published 2019
    “…Thus, certain group of researchers also developed machine learning tools based on support vector machine (SVM) and hidden Markov models (HMM) for the identification of novel and effective biofilm inhibitory peptides (BIPs), while others used in silico approaches for predicting and designing of antibiofilm peptides usingbidirectional recursive neural network (BRNN) and Random Forest (RF) algorithms. …”
    Get full text
    Get full text
    Book Section
  18. 18

    A MATLAB-Based Convolutional Neural Network Approach For Face Recognition System by Syazana Itqan, Khalid, Syafeeza, Ahmad Radzi, Norhashimah, Mohd Saad

    Published 2016
    “…The research on face recognition still continues after several decades since the study of this biometric trait exists. This paper discusses a method on developing a MATLAB-based Convolution Neural Network (CNN) face recognition system with Graphical User Interface (GUI) as the user input. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Trends on technologies and artificial intelligence in education for personalized learning: systematic literature review by Hashim, Suraya, Omar, Muhd Khaizer, Ab. Jalil, Habibah, Mohd Sharef, Nurfadhlina

    Published 2022
    “…The research and practices reported in the study also show how personalized learning was used and factors that made it work, thus the finding of this paper will guide other researchers to recognize various personal traits and the identification of appropriate technology trends and activities for further studies, as well as assist developers in the development of the personalized learning system and closely related to the adaptive learning systems.…”
    Get full text
    Get full text
    Article