Search Results - (( patterns scoping algorithm ) OR ((( patterns based algorithm ) OR ( patterns path algorithm ))))

Refine Results
  1. 1

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The proposed algorithm will switch its working pattern based on the goal minimum and boundary maximum index distances. …”
    Get full text
    Thesis
  2. 2

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Development of behavior-based reactive navigation system for mobile robot by Mohd Hamami, Mohd Ghazali

    Published 2013
    “…The repeatability tests shown that the developed navigation algorithm able the robot to reach the target with the similar navigation path pattern outcome in each simulation tests. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Feature extraction: hand shape, hand position and hand trajectory path by Bilal, Sara Mohammed Osman Saleh, Akmeliawati, Rini

    Published 2011
    “…The performance of recognition system fIrst depends on the process of getting effIcient features to represent pattern characteristics [1]. There is no algorithm which shows how to select the representation or choose the features [2] so the selection of features will depend on the application. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  6. 6

    New perturb and observe algorithm based on trapezoidal rule: uniform and partial shading conditions by Mahmod Mohammad Altwallbah, Neda, Mohd Radzi, Mohd Amran, Azis, Norhafiz, Shafie, Suhaidi, Mohd Zainuri, Muhammad Ammirrul Atiqi

    Published 2022
    “…The proposed Trapezoidal rule based P&O algorithm is evaluated under three conditions: (1) under uniform irradiance (2) under shading conditions and (3) under sudden and step changes in irradiation levels as well as the transition between shading patterns. …”
    Get full text
    Get full text
    Article
  7. 7

    Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal by Fadzal, Ahmad Nazmi

    Published 2017
    “…Pheromone concept is the main criterion that distinguish ACO to other algorithms. Based on the concept, pheromone saturation is used to combine stackable solution pattern that is discovered while straying to different term node to build a path. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Destination prediction based on past movement history by Waheed, Mihsaan

    Published 2020
    “…Matching of the history with the user's movement is done through a simple pattern recognition technique. The system includes an algorithm that simulates incoming data from a user and matches on a window by window basis to the history. …”
    Get full text
    Thesis
  9. 9

    Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan by Aznan, Muhammad Nur Syazwanie Aznan

    Published 2019
    “…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. This project will use the rapid application development (RAD) methodology since this are the most suitable method for developing the system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    New reflector shaping methods for dual-reflector antenna by Quzwain, Kamelia, Yamada, Yoshihide, Kamardin, Kamilia, Abd Rahman, Nurul Huda, Ismail, Alyani

    Published 2022
    “…The accuracy of MATLAB program is ensured from the obtained ray path results, aperture distribution and radiation pattern. …”
    Get full text
    Get full text
    Article
  11. 11

    Development of high speed booth multiplier with optimized stuck-at fault implementation by Mohammed Khalid, Muhammad Nazir, Wan Hasan, Wan Zuha, Sulaiman, Nasri, Wagiran, Rahman

    Published 2002
    “…Deterministic technique will be used to detect failure circuit base on test pattern generation. The Test Pattern Generation(TPG) is the process of providing a set of test stimuli plus expected fault free response to meet the requirement of a target fault list. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A Study of Visual Attention in Diagnosing Cerebellar Tumours by Kuryati, Kipli, Kasumawati, Lias, Dayang Azra, Awang Mat, Othman, A.K., Ade Syaheda Wani, Marzuki, Zamhari, N.

    Published 2009
    “…The status of each MRS is verified by using decision algorithm. Analysis involves determination of humans’s eye movement pattern in measuring the peak of spectrograms, scan path and determining the relationship of distributions of fixation durations with the accuracy of measurement. …”
    Get full text
    Get full text
    Article
  13. 13

    Model Predictive Controller (MPC) Design for an UAV Quadcopter in Windy Critical Environment by Mustapha Amine, Sadi

    Published 2025
    “…The UAV followed predefined paths to collect data on altitude, roll, pitch, yaw, and responses to wind turbulence, enabling refined control strategies and model improvements based on real-world performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Improving Time Series Models Prediction Based On Empirical Mode Decomposition Using Stock Market Data by Hossain, Mohammad Raquibul

    Published 2021
    “…However, real life data including stock price data have sophisticated features and patterns encompassing nonlinearity and non-stationarity. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Path Planning Optimization For Solar-Powered Perpetual Flight Across The World by Lim, Guang Ming

    Published 2018
    “…The successful flight pattern done by (Tan) which has covered latitude of ±66 ºat various longitude is used in this research with the attempt to reach the global coverage. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Spiraling motion of an underwater glider: Dynamic modeling by Javaid, M.Y., Ovinis, M., Hashim, F.B.M., Maimun, A., Ahmed, Y.M., Ullah, B.

    Published 2016
    “…The steady-state spiraling equations were derived and solved recursively using the solve algorithm. The results compare well with simulation results based on Newton's method. …”
    Get full text
    Get full text
    Article
  17. 17

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…Routing protocols for WSN are responsible for maintaining the routes between the source node and base station. The challenging issue of routing protocols is to reduce the communication overhead for data transmission by determining an optimal path. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Improving named entity recognition accuracy of gene and protein in biomedical text by Tohidi, Hossein

    Published 2011
    “…The strength of our proposed approach for recognizing biomedical named entity is based on a Statistical Character-Based Syntax Similarity (SCSS) algorithm which measured similarity between all extracted candidates and the well-known biomedical named entities from a corpus. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Auto raise hand in Microsoft teams (API/Extension) by Teh, Boon Hin

    Published 2023
    “…To be more specific, it is regarding facial expression recognition based on deep learning. Artificial Intelligence focuses on developing intelligences of machines, by developing algorithms, machines are able to learn from data and patterns, even perform tasks that require human intelligence, such as visual perception, speech recognition, and decision-making. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Machine Learning Based Detection for Compromised Accounts on Social Media Networks by K., Swapna, M., Rithika, K., Rukmini, S., Swachitha, Y., Komali

    Published 2025
    “…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article