Search Results - (( its application during algorithm ) OR ( _ relation based algorithm ))

Refine Results
  1. 1

    Dynamic obstacle handling in multi-robot coverage by Tay, Wing Le

    Published 2024
    “…Unlike the existing Lloyd’s algorithm which primarily focuses on achieving complete coverage, the Modified Lloyd’s algorithm with VO can determine the time to collision based on the relative distances and velocities of robots and dynamic obstacle. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Development of behavior-based reactive navigation system for mobile robot by Mohd Hamami, Mohd Ghazali

    Published 2013
    “…The algorithm also control the robot velocity during its navigation based on the Euclidean distance of the robot and the target and also distance input from the sensors. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An improved electromagnetism-like mechanism algorithm for the optimization of maximum power point tracking / Tan Jian Ding by Tan, Jian Ding

    Published 2017
    “…The search scheme began with relatively bigger steps. The algorithm then systematically tuned the step sizes based on a specially designed nonlinear equation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement by Karami, Mahdi

    Published 2011
    “…This thesis present a genetic algorithm based method for placement of FACTS devices for voltage profile improvement. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Q-Learning’s reward function assigns the highest value to the least frequently executed action without taking into consideration its potential ability in detecting failures. Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Cache replacement algorithm using hierarchical allocation scheduling by Mohd Sharif, Mohammad Faizal

    Published 2014
    “…There is no determination of relative important instruction in this policy. By removing this, based on the least recent, it might cause a potential delay in the future processing if the removed instruction depends on it. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Holy Qur'an speech recognition system Imaalah checking rule for warsh recitation by Yousfi, Bilal, Zeki, Akram M.

    Published 2017
    “…Subsequently, after features extraction, a classification algorithm (Hidden Markov Models (HMM)) is employed to compare the features extracted in real-time with that available in the knowledge base.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2014
    “…The goal is to identify changes in a method's body due to data dependence, control dependence and dependent due to object relation such as inheritance and polymorphism, select the test cases based on affected statements and ordered them based on their fitness by using GA. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design. by Khatun, Sabira

    Published 2006
    “…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
    Get full text
    Patent
  10. 10

    A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm by Ahmed Ali Mohammed, Al-saffar

    Published 2024
    “…The built DCCRNN is based on the Salp Swarm optimization Algorithm (SSA), a processor that given a particular dataset will find the best CRNN’s structure and hyperparameters. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Battery energy storage system (BESS) modeling for microgrid by Zulkifly, Zahir, Yusoff, Siti Hajar, Tumeran, Nor Liza, Razali, Nur Syazana Izzati

    Published 2023
    “…Furthermore, with Simulink, unpredictable variables such as Renewable Energy (RE) sources input and loads demands that are related to MPC can be measured easily. The algorithm of MPC isa cost function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Relative position-based collision avoidance system for swarming UAVs using multi-sensor fusion by Rambabu, Rethnaraj, Bahiki, Muhammad Rijaluddin, Md Ali, Syaril Azrad

    Published 2015
    “…This paper presents the development of a quadrotor unmanned aerial vehicle (UAV) that is capable of quad-directional collision avoidance with obstacles in swarming applications through the implementation of relative position based cascaded PID position and velocity controllers. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Computational intelligence: It’s application in digital watermarking by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Abdul Latif, Khairun Nisaa’

    Published 2013
    “…It was found that ANN based watermarking outperformed the No ANN algorithm in terms of imperceptibility. …”
    Get full text
    Get full text
    Article
  15. 15

    Deployment of new dynamic cryptography buffer for SCADA security enhancement by Aamir, Shahzad, Musa, Shahrulniza, M., Irfan, Shah, Asadullah

    Published 2014
    “…The DCB contains several fields/sub-fields which have been used during implementation of cryptography algorithm and other information ( or detail) related with protocol security. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Feature engineering techniques to classify cause of death from forensic autopsy reports / Ghulam Mujtaba by Ghulam , Mujtaba

    Published 2018
    “…Experimental results showed that the proposed techniques outperformed the traditional BoW and its variant techniques. Moreover, support vector machines and random forest algorithms outperformed the four other algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Structural assessment of damaged and CFRP repaired reinforced concrete beams from experimental modal analysis / Moatasem Mohammed Fayyadh by Moatasem, Mohammed Fayyadh

    Published 2012
    “…Thus in this study, new algorithms based on natural frequencies and mode shapes for damage detection are proposed to overcome some of the shortcomings which are related to reinforced concrete (RC) being a composite and heterogeneous material. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Embedded Artificial Intelligent (AI) To Navigate Cart Follower by Tang, Khai Luen

    Published 2018
    “…Therefore, this research is to create an AI system for the AI cart follower with a visual based sensor. The visual based sensor gathered the information of the width, height, angle, x and y coordination of the colour pattern board which situated behind the wheelchair and translate this information into relative position information which enable the cart to follow the wheelchair. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Unmanned aerial vehicle power estimation with non-polarity charging system by Hadi, Al Obaidi Mohammed Rmaez

    Published 2019
    “…Therefore, this topology utilizes its own microcontroller and software driver to perform its functions. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Model based slicing split the large architectures of software into smaller sub models during early stages of SDLC. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper