Search Results - (( data implication from algorithm ) OR ( parameter extraction path algorithm ))

Refine Results
  1. 1

    Evaluation of robot path planning algorithms in global static environments: genetic algorithm vs ant colony optimization algorithm / Nohaidda Sariff and Norlida Buniyamin by Sariff, Nohaidda, Buniyamin, Norlida

    Published 2010
    “…This paper presents the application of Genetic Algorithm and Ant Colony Optimization (ACO) Algorithm for robot path planning (RPP) in global static environment. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Online Mapping-Based Navigation System for Wheeled Mobile Robot in Road Following and Roundabout by Ali, Mohammed A. H., Mailah, Musa

    Published 2018
    “…In this work, the online mapping of mobile robot employing the utilization of sensor fusion technique is used to extract the road characteristics that will be used with path planning algorithm to enable the robot to move from a certain start position to predetermined goal, such as road curbs, road borders, and roundabout. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  3. 3
  4. 4

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…A new mutation vector inspired by the two-opposite path (2-Opt) algorithm with adaptive mutation scalar (F ) and crossover rate (CR) control parameters were employed to enhance the exploration and exploitation phases of the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Sensors Fusion based Online Mapping and Features Extraction of Mobile Robot in the Road Following and Roundabout by Ali, Mohammed A. H., Musa, Mailah, Wan Azhar, Wan Yusoff, Zamzuri, Hamedon, Zulkifli, Md. Yusof, Anwar, P. P. Abdul Majeed

    Published 2016
    “…A road feature extraction based mapping system using a sensor fusion technique for mobile robot navigation in road environments is presented in this paper. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Application Of Bibliometric Analysis on Root Growth Algorithm by Tengku Malim Busu, Tengku Nurul Aimi Balqis, Ahmad Kamaruddin, Saadi, Ahad, Nor Aishah, Md Ghani, Nor Azura, Hamid, Hashibah

    Published 2024
    “…An article reviewed and analyzed bibliographic data on metaheuristics but is not specific on the topic of root growth algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…Types of attacks can be Ping of Death, flooding, remote-controlled attacks, UDP flooding, and Smurf Attacks. Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Algoritma pendaraban nombor perpuluhan dari perspektif pelajar Tingkatan Satu by Md. Yunus, Aida Suraya

    Published 2001
    “…This study discusses the algorithms in multiplication involving decimal numbers from the perspectives of Form One students. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows by Zhang, Shasha, Dong, Qiming, Yasin, Megat Al Imran, Fang, Ng Chwee

    Published 2026
    “…Preprocessing removes noise from text data, normalizes sentiment word lists and undertakes temporal transformation. …”
    Get full text
    Get full text
    Article
  12. 12

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…Following a thorough examination of numerous algorithms, CNN was determined to be the best effective method for age recognition from facial features due to its ability to automatically extract important data. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…Social implications: The satisficing algorithm of the coalition will satisfy all stakeholders. …”
    Get full text
    Get full text
    Article
  16. 16

    Prediction of payment method in convenience stores using machine learning by Pratondo, Agus, Novianty, Astri, Pudjoatmodjo, Bambang

    Published 2023
    “…The Random Forest algorithm was employed due to its robustness in handling complex, high-dimensional data, and its ability to provide reliable predictions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Not seeing the forest for the trees: Generalised linear model out-performs random forest in species distribution modelling for Southeast Asian felids by Chiaverini, Luca, Macdonald, David W., Hearn, Andrew J., Kaszta, Zaneta, Ash, Eric, Bothwell, Helen M., Can, Ozgun Emre, Channa, Phan, Clements, Gopalasamy Reuben *, Haidir, Iding Achmad, Kyaw, Pyae Phyoe, Moore, Jonathan H., Rasphone, Akchousanh, Tan, Cedric Kai Wei, Cushman, Samuel A.

    Published 2023
    “…Using felid presence-absence data from three study regions in Southeast Asia (mainland, Borneo and Sumatra), we tested the performances of SDMs by implementing four modelling frameworks: GLM and RF with bootstrapped and non-bootstrapped training data. …”
    Get full text
    Get full text
    Article
  18. 18

    Ethical implications of artificial intelligence in nursing care: a systematic literature review from an Islamic perspective by Wan Mamat, Wan Hasliza, Mahat, Nur Ain, Zainudin, Airul Azizan, Mohamad Shariff, Nurasikin, Syed Elias, Sharifah Munirah, Salah, Machouche, Jamaludin, Maizatul Aisha, Arini, Merita

    Published 2025
    “…The synthesis identified three primary ethical themes: 1) Safety, with subthemes of data privacy, misuse, algorithm bias, and physical safety; 2) Human element, focusing on trust, empathy, and human touch; and 3) Autonomy and informed decision-making. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Electric vehicle battery state of charge estimation using metaheuristic-optimized CatBoost algorithms by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Ahmad Salihin, Samsudin, Amir Izzani, Mohamed, Mohd Mawardi, Saari

    Published 2025
    “…Three distinct metaheuristic algorithms were investigated: Barnacles Mating Optimizer (BMO), Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Whale Optimization Algorithm (WOA), each integrated with CatBoost to optimize critical parameters including learning rate, tree depth, regularization, and bagging temperature. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20