Search Results - (( based reasoning graph algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- based reasoning »
- graph algorithm »
-
1
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The main reason for designing the attack graph is to predict the attack as well as to predict the attack’s next step in the network. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Solving the minimum dominating set problem of partitioned graphs using a hybrid bat algorithm
Published 2020“…This paper investigates the swarm intelligence behaviour represented by a population-based approach called the bat algorithm (BA) to find the smallest set of nodes that dominate the graph. …”
Get full text
Get full text
Article -
3
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…The main reason for designing the attack graph is to predict the attack as well as to predict the attack's next step in the network. …”
Get full text
Get full text
Get full text
Thesis -
4
Multiple case-based retrieval for university course timetabling problem
Published 2016“…This thesis presents research for Case-based reasoning (CBR), a knowledge-based reasoning technique to solve university timetabling problem such as resource allocation for student’s course timetabling. …”
Get full text
Get full text
Thesis -
5
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…Then, the parallel genetic algorithm is employed to perform batch retrieval and to accelerate the search in large search space of the Gene Ontology graph. …”
Get full text
Get full text
Get full text
Article -
6
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. The main idea is to maintain maximum sized cliques required for location cloaking in an undirected graph. …”
Get full text
Get full text
Article -
7
Guidance system based on Dijkstra-ant colony algorithm with binary search tree for indoor parking system
Published 2021“…Moreover, the reason behind using the BST is to make the generation of the path by Dijkstra’s algorithm more accurate and less time performance. …”
Get full text
Get full text
Get full text
Article -
8
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. The main idea is to maintain maximum sized cliques required for location cloaking in an undirected graph. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong
Published 2006“…Though most theoretical background of compression tool compresses datasets based on Lempel-ziv’s algorithm, in reality, these tools varied when it comes to compressing a binary file to a text file or a graphical one. …”
Get full text
Get full text
Thesis -
11
Analyzing students’ experience in programming with computational thinking through competitive, physical, and tactile games: The quadrilateral method approach
Published 2021“…The CT elements in this research focus on four major programming concepts, which are decomposition, pattern recognition, abstraction, and algorithmic thinking. We have conducted game activities through several algorithms that include sorting, swapping, and graph algorithms and analyzed how the game affects the student experience (SX) in understanding the CT concept in those algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Keyword query processing interface model of ontological natural language manipulation
Published 2010“…For the problem of conversion, techniques with fixed templates face scalability problems; while graph only techniques are processing intensive. We propose a variable template based conversion with inexpensive graph techniques to handle lengthy queries and exploring indirect connectivity among elements. …”
Get full text
Get full text
Thesis -
13
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
14
Evolutionary approach for combinatorial testing of software product lines
Published 2020“…The approaches are (1) adopting an Estimation of Distribution Algorithm approach to aid the construction of a covering array driven by second order feature dependence, and (2) construct a feature configuration dependence graph to assist in building the variable-strength covering array. …”
Get full text
Get full text
Thesis
