The use of genetic algorithm in autonomous robot navigation
| Main Authors: | Hassan, Raini, Alshaikhli, Imad Fakhri Taha, Shah, Asadullah |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/20178/ http://irep.iium.edu.my/20178/1/1.pdf |
Similar Items
The use of genetic algorithm in improving medical image segmentation techniques
by: Hassan, Raini, et al.
Published: (2011)
by: Hassan, Raini, et al.
Published: (2011)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
An improved genetic algorithm for solving the multiprocessor scheduling problem
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Rational drug design using genetic algorithm: case of malaria disease
by: Al-Safi, Hassen Mohammed, et al.
Published: (2012)
by: Al-Safi, Hassen Mohammed, et al.
Published: (2012)
Real time scheduling for autonomous mobile robots using genetic algorithm and constraint based reasoning
by: Mohammed Hasan, Ammar Abdo
Published: (2006)
by: Mohammed Hasan, Ammar Abdo
Published: (2006)
Online feature selection based on input significance analysis (ISA) for evolving connectionist systems (ECos)
by: Hassan, Raini, et al.
Published: (2017)
by: Hassan, Raini, et al.
Published: (2017)
Optimal path planning for urban vehicles using
Internet of Things: a new navigation perspective
by: Alawadhi, Nayef, et al.
Published: (2019)
by: Alawadhi, Nayef, et al.
Published: (2019)
Development of saliency metric for autonomous landmark selection in cognitive robot navigation / Gao Hanyang
by: Gao , Hanyang
Published: (2022)
by: Gao , Hanyang
Published: (2022)
Windows installation
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Task scheduling
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Basic storage management
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Implementation of Cognitive Mapping Algorithm for Robot Navigation System
by: Ismail , Amelia Ritahani, et al.
Published: (2014)
by: Ismail , Amelia Ritahani, et al.
Published: (2014)
A new algorithm for human face detection using skin color tone
by: Zangana, Hewa Majeed, et al.
Published: (2013)
by: Zangana, Hewa Majeed, et al.
Published: (2013)
Image editing
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image effects
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image tool function
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image clone 1
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image clone 2
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image and special effects
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Basic text effects
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Text animation
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Text effects
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image filtering
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image quality improvement
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Comparative study on 4G/LTE cryptographic algorithms based on different factors
by: Ghanim, Alyaa, et al.
Published: (2014)
by: Ghanim, Alyaa, et al.
Published: (2014)
Analysis of confidentiality algorithms in different mobile generations
by: Jassim, Khalid Fadhil, et al.
Published: (2017)
by: Jassim, Khalid Fadhil, et al.
Published: (2017)
Mobile technology generations and cryptographic algorithms: analysis study
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Internal structure of computer systems
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Interfaces and protocols
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Firmware program
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Similar Items
-
The use of genetic algorithm in improving medical image segmentation techniques
by: Hassan, Raini, et al.
Published: (2011) -
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011) -
An improved genetic algorithm for solving the multiprocessor scheduling problem
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011) -
Rational drug design using genetic algorithm: case of malaria disease
by: Al-Safi, Hassen Mohammed, et al.
Published: (2012) -
Real time scheduling for autonomous mobile robots using genetic algorithm and constraint based reasoning
by: Mohammed Hasan, Ammar Abdo
Published: (2006)