Search Results - (( based coding ((drops algorithm) OR (graph algorithm)) ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator by Othman, Nor Shuhaida

    Published 2010
    “…The scope of the paper based on optimal path trace back using graph theory. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Regression test case selection & prioritization using dependence graph and genetic algorithm by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2014
    “…The approach is based on optimization of selected test case from dependency analysis of the source codes. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7
  8. 8
  9. 9

    Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Experimental implementation controlled SPWM inverter based harmony search algorithm by Najeeb, Mushtaq, Mansor, Muhamad, Razali, Ramdan, Daniyal, Hamdan, A. F. Yahaya, Jabbar

    Published 2017
    “…Based on the output results, the proposed voltage controller using HS algorithm based PI (HS-PI) showed that the inverter output performance is improved in terms of voltage amplitude, robustness, and convergence rate speed as compared to PSO algorithm based PI (PSO-PI). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning by Nur Khairani, Kamarudin, Ahmad Firdaus, Zainal Abidin, Azlee, Zabidi, Mohd Faizal, Ab Razak

    Published 2023
    “…To address these shortcoming issues many security experts use different approaches to detect malware based on various static features. However, by considering only the statistical features, the potential semantic information such as the behavioral feature of the code is overlooked. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…The IVRP, EBCRA and ESRSBRP performance have been compared with the other routing algorithms. The efficiency and scalability of the proposed algorithms are measured based on different performance metrics, namely: throughput, packet delivery ratio, end to end delay, the number of dropped packets and normalized control overhead. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Predicting energy consumption pattern based on top trending videos YouTube 2021 using machine learning techniques by Ng, Jiun Shen

    Published 2022
    “…Streamlit.io application was chosen as the website to represent the coding. At the end of this project, a formula equation and graph will be thoroughly discussed and analysed for projecting energy consumption patterns based on the most trending videos on YouTube in 2021.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20