Search Results - (( re evaluation path algorithm ) OR ( model verification based algorithm ))*

Refine Results
  1. 1

    AUTOMATED GUIDED ROBOT (AGR) by Abd Rahim, Mohd Azlan Shah

    Published 2007
    “…Compared to manual mobile robots, AGRs require sensors and control systems that generate feedback for the re-evaluation of an unexpected situation and to detect obstacles in the path the AGR is required to follow. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    State-Aware re-configuration model for multi-radio wireless Mesh Networks by Zakaria, Omar, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Khalifa, Othman Omran, Azram, Mohammad, Goudarzi, Shidrokh, Jivanadham, Lalitha Bhavani, Zareei, Mahdi

    Published 2017
    “…The proposed algorithm re-assigns channels to radios and re-configures flows’ routes with aim of achieving a tradeoff between maximizing the network throughput and minimizing the re-configuration overhead. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Ant-based vehicle congestion avoidance framework using vehicular networks / Mohammad Reza Jabbarpour Sattari by Sattari, Mohammad Reza Jabbarpour

    Published 2015
    “…Previous researches concentrated on using static algorithms to find the shortest path in VTRSs. However, providing a shortest path without considering other factors such as congestion, accidents, obstacles, travel time and speed is not a proper solution for vehicle traffic congestion problem. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…In dealing with traffic routing problem, two algorithms, Dijkstra's Shortest Path and Genetic Algorithm (GA) are combined together and enhanced to re-strategize a better routing mechanism for a heterogeneous mix of traffic classes ranging from traditional voice calls to multimedia data services in Low Earth Orbit (LEO) satellite networks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Offline signature verification system using hidden markov model (HMM) analysis of varying number of states and state transition topology by Bakri N.B., Ahmad S.M.S., Shakil A.

    Published 2023
    “…This paper describes the design and development of an offline signature verification system that is based on Hidden Markov Modeling (HMM) technique performed on a series of a localized direction feature extracted from a scanned signature image. …”
    Article
  10. 10

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…This research also proposes the improvement of mean time to failure (MTTF) by using the new model checking method. At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  11. 11

    Active intelligent control of vibration of flexible plate structures by Md Salleh, Salihatun

    Published 2011
    “…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
    Get full text
    Get full text
    Thesis
  12. 12

    A self-adaptive agent-based simulation modelling framework for dynamic processes by Ling, Loo Yim, Dr.

    Published 2023
    “…Lack of validation and verification of ABS model and results against broader dataset or domains, led to non-robust and unreliable simulation model and results. …”
    text::Thesis
  13. 13
  14. 14

    Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing by Raja Segaran, Bama, Mohd Rum, Siti Nurulain, Hafez Ninggal, Mohd Izuan, Mohd Aris, Teh Noranis

    Published 2025
    “…However, while blockchain ensures transparency, it lacks real-time anomaly detection capabilities. ML algorithms, particularly supervised models such as Random Forest, XGBoost, and Neural Networks, are well-suited for detecting fraudulent patterns and verifying the authenticity of forest carbon credit transactions. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Development of biosignals-based multimodal biometric system by Osamah Sadeq Alhamdani

    Published 2014
    “…Heart Sound Verification (HSV) provides an average equal error rate (EER) of 13.8% while the average EER for the Speaker Verification model (SV) is 2.1 %. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…The development of an android application is done and provided with three calculation method which is an absolute method, relative method and finding suitable geoid model method. There is also an analysis that been done which is the verification of the algorithm in the developed application and the comparison between a different interpolation method. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder by Chen, Ruo Han, Ng, Boon Sim, Paramasivam, Shamala, Ren, Li

    Published 2024
    “…Finally, A Bidirectional Attention Self-Encoding English Text Semantic Complexity Automatic Grading Model (BSETG) is established. This study conducted experimental verification based on semantic Evaluation (SemEval) dataset, convolutional neural network (CNN)/Daily Mail dataset and Penn Treebank dataset, and conducted a comparative analysis with existing semantic complexity evaluation methods. …”
    Get full text
    Get full text
    Article