Search Results - (( _ evacuation system algorithm ) OR ( user identification using algorithm ))*
Search alternatives:
- identification using »
- user identification »
- evacuation system »
- system algorithm »
- using algorithm »
-
1
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Moreover, fire detection system and evacuation system operate independently whereby fire alarm control panel system (FACPS) only receives the signal and thereafter, the evacuation process takes parts without any information about the hazardous fire location. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
The banjir rescue: an IoT-based flood evacuation center system / Nur Aliah Syamsurial
Published 2020“…Finally, the selection is made where the algorithm will choose the nearest evacuation center to the victims. …”
Get full text
Get full text
Thesis -
3
Adaptive emergency evacuation centre management for dynamic relocation of flood victims using firefly algorithm
Published 2016“…Therefore, this article proposes a decision aid model to be utilized in realizing an adaptive emergency evacuation centre management system. This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app. …”
Get full text
Get full text
Get full text
Article -
4
-
5
The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims
Published 2016“…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app.The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre.The proposed decision aid model and the adaptive system can be applied in supporting the National Security Council’s respond mechanisms for handling disaster management level II (State level) especially in providing better management of the flood evacuating centres.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Banjir rescue: IOT-based flood evacuation center / Nor Azimah Khalid ... [et al.]
Published 2025“…Finally, the selection is made where the algorithm will choose the nearest evacuation center to the victims. …”
Get full text
Get full text
Article -
7
Modification of dijkstra's algorithm for safest and shortest path during emergency evacuation
Published 2015“…Intelligent autonomous evacuation navigation (AEN) system manages to solve wayfinding problems during emergency evacuation, especially for those who are not familiar with the building. …”
Get full text
Get full text
Get full text
Article -
8
Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters
Published 2025“…This study addresses disaster management within Multi-Agent System (MAS) environments, focusing on two critical phases: evacuation and rescue. …”
Get full text
Get full text
Thesis -
9
Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model
Published 2025“…Many researchers have created simulation evacuation models to test evacuation systems' ability to optimize evacuation time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Development of IoT-based automated dynamic emergency response system against fire incidents in academic building
Published 2023“…By leveraging the power of IoT technology, machine learning algorithms and BIM, the proposed system aims to reduce the impact of fire disasters by providing accurate and timely information, route optimization and facilitating effective evacuation and rescue efforts. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
12
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
15
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article -
16
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Android smartphone is used in order to test this algorithm.…”
Get full text
Get full text
Thesis -
17
Optimizing Crowd Evacuation In The Emergency Route Planning Problem
Published 2015“…In this study, an integrated evacuation planning framework utilizing crowd evacuation model and an artificial immune system (AIS) algorithm, called iEvaP, was proposed. iEvaP was validated against Lu et al. (2003) and its parameters were calibrated for optimum performance.…”
Get full text
Get full text
Thesis -
18
-
19
Smart cards and the fingerprint: a framework for user identification and authentication
Published 2003“…As a result, the research proposed a framework for user identification and authentication in automatic-teller-machine (ATM) systems using fingerprints and smart cards as opposed to the PIN and magnetic-stripe cards.…”
Get full text
Get full text
Get full text
Article -
20
