Search Results - (( based coding ((bee algorithm) OR (graph algorithm)) ) OR ( java application based algorithm ))
Search alternatives:
- application based »
- java application »
- graph algorithm »
- bee algorithm »
- based coding »
-
1
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
2
Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review
Published 2018“…The small benchmark graphs will help the researchers to evaluate efficient approximation algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator: article
Published 2010“…The scope of the paper based on optimal path trace back using graph theory. …”
Get full text
Get full text
Article -
4
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator
Published 2010“…The scope of the paper based on optimal path trace back using graph theory. …”
Get full text
Get full text
Student Project -
5
Regression test case selection & prioritization using dependence graph and genetic algorithm
Published 2014“…The approach is based on optimization of selected test case from dependency analysis of the source codes. …”
Get full text
Get full text
Article -
6
Optimal water supply reservoir operation by leveraging the meta-heuristic Harris Hawks algorithms and opposite based learning technique
Published 2024“…The HHO is still a promising method, as proven by its reliability and resilience indices compared to other published heuristic algorithms: at 62.50% and 1.56, respectively. The Artificial Bee Colony (ABC) outcomes satisfied demand at 61.36%, 59.47% with the Particle Swarm Optimisation (PSO), 55.68% with the real-coded Genetic Algorithm (GA), and 23.5 percent with the binary GA. …”
Article -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
-
9
-
10
An effective transmit packet coding with trust-based relay nodes in VANETs
Published 2020“…Here, the trust-based graph optimization is performed using Cuckoo search algorithm to select the secure relay nodes. …”
Get full text
Get full text
Get full text
Article -
11
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
14
-
15
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
-
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
20
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023“…To address these shortcoming issues many security experts use different approaches to detect malware based on various static features. However, by considering only the statistical features, the potential semantic information such as the behavioral feature of the code is overlooked. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
