Search Results - (( pattern detection path algorithm ) OR ( variable integration based algorithm ))

Refine Results
  1. 1

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
    Get full text
    Thesis
  2. 2

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models by ul Islam, B., Baharudin, Z.

    Published 2017
    “…The focus of the paper is to propose a hybrid approach for the selection of the most influential input variables for the training and testing of neural network based hybrid models. …”
    Get full text
    Get full text
    Article
  6. 6

    Enhanced Adaptive Confidence-Based Q Routing Algorithms For Network Traffic by Yap, Soon Teck

    Published 2004
    “…These two adaptive routing algorithms enhance the existing Confidence-based Q (CQ) and Confidence-based Dual Reinforcement Q (CDRQ) Routing Algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Machine Learning Based Detection for Compromised Accounts on Social Media Networks by K., Swapna, M., Rithika, K., Rukmini, S., Swachitha, Y., Komali

    Published 2025
    “…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    ENGINEERING DESIGN WITH PSO ALGORITHM by MHD BASIR, SITI NUR HAJAR

    Published 2019
    “…Creating a PSO algorithm-based infrastructure integrating with the recommendation system will further enhance solution to the design problem. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    Development of high speed booth multiplier with optimized stuck-at fault implementation by Mohammed Khalid, Muhammad Nazir, Wan Hasan, Wan Zuha, Sulaiman, Nasri, Wagiran, Rahman

    Published 2002
    “…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…First, unified ADALINEs based fundamental component extraction algorithm is proposed for dual functionality. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Unlike the existing optimization algorithm, VL-WIDE features the capability of searching different lengths of solutions to cover the variable number of cloudlets for deployment. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Numerical algorithm of block method for general second order ODEs using variable step size by Nazreen Waeleh, Zanariah Abdul Majid

    Published 2017
    “…Consequently, a direct block multistep method with utilization of variable step size strategy is proposed. This method was developed for computing the solution at four points simultaneously and the derivation based on numerical integration as well as using interpolation approach. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Numerical algorithm of block method for general second order ODEs using variable step size by Waeleh, Nazreen, Abdul Majid, Zanariah

    Published 2017
    “…Consequently, a direct block multistep method with utilization of variable step size strategy is proposed. This method was developed for computing the solution at four points simultaneously and the derivation based on numerical integration as well as using interpolation approach. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    SURE-Autometrics algorithm for model selection in multiple equations by Norhayati, Yusof

    Published 2016
    “…The algorithm is developed by integrating the SURE model with the Autometrics search strategy; hence, it is named as SURE-Autometrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An improved neuroendocrine-proportional-integral-derivative controller with sigmoid-based secretion rate for nonlinear multi-input-multi-output crane systems by Mohd Riduwan, Ghazali, Mohd Ashraf, Ahmad, Raja Mohd Taufika, Raja Ismail, Tokhi, M. O.

    Published 2019
    “…The performance of the proposed sigmoid-based secretion rate neuroendocrine–proportional–integral–derivative controller-based safe experimentation dynamics algorithm is evaluated by tracking the error and the control input. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Parallel method using MPI for solving large systems of delay differential equations by Ishak, Fuziyah, Suleiman, Mohamed

    Published 2012
    “…The algorithm is based on a variable stepsize variable order block method. …”
    Get full text
    Get full text
    Conference or Workshop Item