Search Results - (( _ evacuation research algorithm ) OR ( based verification based algorithm ))*
Search alternatives:
- evacuation research »
- research algorithm »
- based verification »
- verification based »
-
1
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…The objective is to design and develop an evacuation route using shortest path algorithm based on the evacuation map of the building. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Simulation method of shortest and safest path algorithm for evacuation in high rise building
Published 2014“…The objectives of this research are to identify the suitable shortest and safest path algorithm for evacuation, and followed by design and develop an evacuation preparedness model simulation via shortest path algorithm to choose a suitable exit route to evacuate the evacuees. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
4
Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters
Published 2025“…For the evacuation phase, a Dynamic Real-Time Capacity Constrained Routing (DRTCCR) algorithm is introduced to address ERP challenges. …”
Get full text
Get full text
Thesis -
5
Stroke-to-stroke matching in on-line signature verification
Published 2010“…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
Get full text
Get full text
Thesis -
6
Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification
Published 2005“…The Proposed Cp Estimation Algorithm Is Based On The Alteration Tracking (At) Followed By An Estimation Algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Evacuation routing optimizer (EROP) / Azlinah Mohamed … [et al.]
Published 2011Get full text
Get full text
Research Reports -
8
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
9
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The classification and verification algorithm was based on face shape elliptical ratio and facial features angle distribution. …”
Get full text
Get full text
Get full text
Article -
10
Optimizing the Social Force Model Using New Hybrid WOABAT-IFDO in Crowd Evacuation in Panic Situation
Published 2022“…This paper addresses the need for improvement in the Social Force Model (SFM) crowd evacuation model in the context of egress studies and current emergency research. …”
Get full text
Get full text
Get full text
Proceeding -
11
-
12
Intelligent biometric signature verification system incorporating neural network
Published 2005“…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. The results of the study showed that the system is effective and promising in identifying correct human signatures presented to the system.…”
Get full text
Get full text
Get full text
Article -
13
An efficient technique for human verification using finger stripes geometry
Published 2007“…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Person Verification Based on Multimodal Biometric Recognition
Published 2022“…First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter -
17
Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing
Published 2025“…This review also examines key performance metrics such as accuracy, precision, recall, and processing time to evaluate the efficiency of various ML algorithms for real-time fraud detection. The findings suggest that integrating ML and blockchain technologies, combined with satellite data, can significantly strengthen transparency and verification in forest carbon credit markets. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Speech emotion verification system (SEVS) based on MFCC for real time applications
Published 2008Get full text
Get full text
Get full text
Proceeding Paper -
20
Flash flood evacuation with discrete particle swarm optimization / Marina Yusoff
Published 2012Get full text
Get full text
Book Section
