Search Results - (( wave optimization strategy algorithm ) OR ( pattern detection path algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
    Get full text
    Thesis
  2. 2

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6
  7. 7

    Optimization-based method for estimating the transmission rate of COVID-19 during the lockdown in Malaysia by Alsayed, Abdallah, Aqel, Mohammad O. A., Kamil, Raja, Sadir, Hayder, Abuzaiter, Alaa, Alezabi, Kamal Ali, Sari, Hasan

    Published 2022
    “…In this work, the optimization-based method is implemented to investigate the effectiveness of lockdown strategies undertaken to contain the COVID-19 during the first two waves in Malaysia. …”
    Get full text
    Get full text
    Article
  8. 8

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis
  9. 9

    OPTIMIZATION-BASED METHOD FOR ESTIMATING THE TRANSMISSION RATE OF COVID-19 DURING THE LOCKDOWN IN MALAYSIA by Alsayed A., Aqel M.O.A., Kamil R., Sadir H., Abuzaiter A., Alezabi K.A., Sari H.

    Published 2023
    “…In this work, the optimization-based method is implemented to investigate the effectiveness of lockdown strategies undertaken to contain the COVID-19 during the first two waves in Malaysia. …”
    Article
  10. 10

    Machine Learning Based Detection for Compromised Accounts on Social Media Networks by K., Swapna, M., Rithika, K., Rukmini, S., Swachitha, Y., Komali

    Published 2025
    “…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…Furthermore, the research explores advanced applications such as integrating NOMA with Millimeter-Wave technology and optimizing user association strategies, enhancing system capacity and overall performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Development of high speed booth multiplier with optimized stuck-at fault implementation by Mohammed Khalid, Muhammad Nazir, Wan Hasan, Wan Zuha, Sulaiman, Nasri, Wagiran, Rahman

    Published 2002
    “…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14