Search Results - (( _ evacuation search algorithm ) OR ( based verification based algorithm ))*

Refine Results
  1. 1

    The Hybrid of WOABAT-IFDO Optimization Algorithm and Its Application in Crowd Evacuation Simulation by Hamizan, Sharbini, Roselina, Sallehuddin, Habibollah, Haron

    Published 2023
    “…Ultimately, the algorithm’s performance also has been tested in crowd simulation evacuation that involves a different number of agents and with/without obstacle scenario. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  2. 2

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Evacuation wayfinding is the process of route/pathfinding or searching from one location to a safety destination. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters by Abusalama, Jawad

    Published 2025
    “…The algorithm aims to generate optimal evacuation routes considering the complexity, capacity constraints, and scale of evacuees in the transportation network. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Firefly Algorithm for adaptive emergency evacuation center management by Yusof, Yuhanis, Hashim, Nor Laily, Che Pa, Noraziah

    Published 2016
    “…Flood disaster is among the most devastating natural disasters in the world, claiming more lives and causing property damage.The pattern of floods across all continents has been changing, becoming more frequent, intense and unpredictable for local communities.Due to unforeseen scenarios, some evacuation centers that host the flood victims may also be drowned.Hence, prime decision making is required to relocate the victims and resources to a safer center.This study proposes a Firefly Algorithm (FA) to be employed in an emergency evacuation center management. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Optimizing the Social Force Model Using New Hybrid WOABAT-IFDO in Crowd Evacuation in Panic Situation by Hamizan, Sharbini, Roselina, Sallehuddin, Habibollah, Haron

    Published 2022
    “…Crowd searching for route choices in crowd evacuation simulations for panic situations remains inaccurate and unrealistic. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  6. 6

    Evacuation routing optimizer (EROP) / Azlinah Mohamed … [et al.] by Mohamed, Azlinah, Yusoff, Marina, Ariffin, Junaidah, Shamsudin, Siti Maryam

    Published 2011
    “…This report presents the solution to the two of the most critical processes in planning for flash Hood evacuation: the evacuation vehicle assignment problem (EVAP) and the evacuation vehicle routing problem (EVRP). …”
    Get full text
    Get full text
    Research Reports
  7. 7
  8. 8

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…On-line Signature Verification is a field of verifying the time series signature data that normally obtained from the tablet-based device. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Modeling and Simulation of Emergency Evacuation from Industry Buildings under Toxic Cloud Release by Benseghir, Hocine, Mohd Fadzil, Mohd Idris, Abdullah, Ibrahim, Kabir, M. Nomani

    Published 2018
    “…Thus, in case of such accidents, the occupants must be immediately evacuated from industry buildings. In this paper, we explore modeling and simulation of occupant-evacuation during a toxic cloud release. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification by Chan, Ying Hui, Abu Bakar, Syed Abdul Rahman

    Published 2005
    “…The Proposed Cp Estimation Algorithm Is Based On The Alteration Tracking (At) Followed By An Estimation Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Intelligent biometric signature verification system incorporating neural network by Lim, Boon Han, Mailah, Musa

    Published 2005
    “…An intelligent feature of the system is made possible through the application of a multilayer feedforward neural network that is used together with suitable algorithms to complement the verification process. The results of the study showed that the system is effective and promising in identifying correct human signatures presented to the system.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An efficient technique for human verification using finger stripes geometry by Rahman, Md. Arafatur, Azad, Md. Saiful, Anwar, Farhat

    Published 2007
    “…The Distance Based Nearest Neighbor Algorithm, which shows greater accuracy than NN is also applied here. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Person Verification Based on Multimodal Biometric Recognition by Annie, Joseph, Ng, Alex Ho Lian, Kuryati, Kipli, Kho, Lee Chin, Dayang Azra, Awang Mat, Sia, Charlie Chin Voon, Chua, David Sing Ngie, Ngu, Sze Song

    Published 2022
    “…First, the multimodal biometric person recognition system is developed based on Convolutional Neural Network (CNN) and ORB (Oriented FAST and Rotated BRIEF) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems by Al-Ghaili A.M., Kasim H., Othman M., Hassan Z.

    Published 2023
    “…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
    Book Chapter
  19. 19

    Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing by Raja Segaran, Bama, Mohd Rum, Siti Nurulain, Hafez Ninggal, Mohd Izuan, Mohd Aris, Teh Noranis

    Published 2025
    “…This review also examines key performance metrics such as accuracy, precision, recall, and processing time to evaluate the efficiency of various ML algorithms for real-time fraud detection. The findings suggest that integrating ML and blockchain technologies, combined with satellite data, can significantly strengthen transparency and verification in forest carbon credit markets. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20