Search Results - (( pattern detection path algorithm ) OR ( time evaluation method algorithm ))

Refine Results
  1. 1

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
    Get full text
    Thesis
  2. 2

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Machine Learning Based Detection for Compromised Accounts on Social Media Networks by K., Swapna, M., Rithika, K., Rukmini, S., Swachitha, Y., Komali

    Published 2025
    “…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    New algorithm for evaluation of electric fields due to indirect lightning strike by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin

    Published 2010
    “…In this paper, using dipole method, Maxwell's equation and Cooray-Rubinstein formula, a new method for calculation of electric field in time domain is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Development of high speed booth multiplier with optimized stuck-at fault implementation by Mohammed Khalid, Muhammad Nazir, Wan Hasan, Wan Zuha, Sulaiman, Nasri, Wagiran, Rahman

    Published 2002
    “…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…The four prime aspects of this work are: firstly, a model of the grid scheduling problem for dynamic grid computing environment; secondly, development of a new web based simulator (SyedWSim), enabling the grid users to conduct a statistical analysis of grid workload traces and provides a realistic basis for experimentation in resource allocation and job scheduling algorithms on a grid; thirdly, proposal of a new grid resource allocation method of optimal computational cost using synthetic and real workload traces with respect to other allocation methods; and finally, proposal of some new job scheduling algorithms of optimal performance considering parameters like waiting time, turnaround time, response time, bounded slowdown, completion time and stretch time. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…In this study an inverse procedure algorithm is proposed in the time domain to evaluate lightning return stroke current based on measured electromagnetic fields at an observation point. …”
    Get full text
    Get full text
    Article
  12. 12

    On comparison between Cooray-Rubinstein and FDTD methods for ground conductivity effect on horizontal electric field evaluation in time domain by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Wan Ahmad, Wan Fatinhamamah, Mohd Nawi, Zawati, Esfahani, Mohammad Tolou Askari Sedehi

    Published 2009
    “…In this paper, the FDTD method and Caligaris et al. algorithm (Cooray-Rubinstein method in time domain) are applied for evaluation of horizontal electric field in the close distance from lightning channel case. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…The third set affirmed that the enhancement on the proposed algorithm, which made use of indexing method that suits the medoids, could boost the performance to about 9 to 27 times in terms of execution time depending on the complexity of the dataset. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Multichannel audio compression: performance evaluation of various algorithms by Abdul Rashid, Siti Aisyah, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2017
    “…This book focuses on performance evaluation of various algorithms on multichannel audio compression. …”
    Get full text
    Get full text
    Get full text
    Book
  15. 15

    Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents by Zulcaffle, Tengku Mohd Afendi

    Published 2007
    “…The results of the algorithms were mathematically evaluated using the Relative Foreground Area Error. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Comparison Between Linear Programming And Integer Linear Programming: A Review by Sam, Mei Lee, Saptari, Adi, Salleh, Mohd Rizal, Mohamad, Effendi

    Published 2018
    “…Three criteria were used to evaluate the characteristics: time complexity, problem size and computational time. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of priority oriented scheduling method to increase the efficiency and reliability for automotive job by Nojabaei, Seyedehfarzaneh

    Published 2012
    “…Eventually, to evaluate the proposed method of scheduling, simulation is operated. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An analytical second-FDTD method for evaluation of electric and magnetic fields at intermediate distances from lightning channell by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Gomes, Chandima, Wan Ahmad, Wan Fatinhamamah

    Published 2010
    “…In this paper, by using dipole method, Maxwell equations and second order finite-difference time domain (later referred as a 2nd FDTD method) on two realistic return stroke currents, an algorithm for evaluation of electric fields is proposed, which is based on numerical methods in the time domain. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A new standardisation and selection framework for real-time image dehazing algorithms from multi-foggy scenes based on fuzzy Delphi and hybrid multi-criteria decision analysis meth... by Abdulkareem, Karrar Hameed, Arbaiy, Nureize, Zaidan, A. A., Zaidan, B. B., Albahri, O. S., Alsalem, M. A., M. Salih, Mahmood

    Published 2020
    “…Firstly, the image dehazing criteria are standardised based on FDM. Secondly, an evaluation experiment is conducted based on standardised criteria and nine real-time image dehazing algorithms to obtain a multi-perspective matrix. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…The evaluation methods were Root Mean Square Error and Mean Absolute Error. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis