Search Results - (( developing consumer graph algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- developing consumer »
- java implementation »
- graph algorithm »
- consumer graph »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator: article
Published 2010“…The existing Smith-Waterman algorithm had complex memory and low performance where the time also was consumed caused by high sensitivity of the large sequences long. …”
Get full text
Get full text
Article -
3
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
4
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator
Published 2010“…The existing Smith-Waterman algorithm had complex memory and low performance where the time also was consumed caused by high sensitivity of the large sequences long. …”
Get full text
Get full text
Student Project -
5
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
6
Dijkstra’s algorithm in Product Searching System (ProSearch) / Nur Hasni Nasrudin ... [et al.]
Published 2015Get full text
Get full text
Conference or Workshop Item -
7
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
8
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
9
Test case minimization applying firefly algorithm
Published 2018Get full text
Get full text
Get full text
Article -
10
Design of DNA fragment assembly using IWP method on application-specific integrated-circuit / Hasniliati Hassan
Published 2017“…After reviewing various algorithms, it was decided to apply de Bruijn graphs and Eulerian circuits that are based on graph theory. …”
Get full text
Get full text
Thesis -
11
Bipartite graph approach to course timetabling problems / Hafizah A Razak
Published 2009“…The prototype is design using constructive heuristic algorithm and colouring the edge of two bipartite graphs. …”
Get full text
Get full text
Thesis -
12
A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity
Published 2024“…Under this framework, different algorithms have been developed where the output relies on an exact distance calculated based on the objects’ features. …”
Get full text
Get full text
Article -
13
Power system intentional islanding for different contingency scenarios using discrete optimization technique
Published 2023“…The initial intentional islanding solution was determined using graph theory approach, to facilitate the proposed MDEP algorithm in determining the optimal intentional islanding strategy. …”
text::Thesis -
14
Recent research in cooperative path planning algorithms for multi-agent using mixed- integer linear programming
Published 2016“…This paper will review and compare the performances of those existing methods that can find solution without graph search algorithm such as Mixed-Integer Linear Programming (MILP) techniques which exactly solves the problem and then propose four alternative MILP formulations which are computationally less intensive and suited for real-time purposes, but yield a theoretically guaranteed suboptimal solution.…”
Get full text
Get full text
Article -
15
Detecting and evaluating surface crack defect of building structure and infrastructure elements using Digital Image Processing approach / Nursyafiqah Razmi
Published 2018“…The thresholding algorithm was developed to detect the crack area and estimate the crack length by using MATLAB version 2015a and 2017a software. …”
Get full text
Get full text
Student Project -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
Intelligent technique for grading tropical fruit using magnetic resonance imaging
Published 2013“…Different structures of multi-layer perceptron neural networks with feed-forward and back-propagation learning algorithms were developed using MATLAB. The theoretical background of MRI and artificial neural network (ANN) backpropagation were also explained. …”
Get full text
Get full text
Get full text
Article -
18
Analysis and modeling of database storage optimization power consumption usage for green data centers
Published 2014“…The proxies can be discovered by using a developed algorithm of functional dependencies (FDs) called as TANE algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Characterisation of essential proteins in proteins interaction networks
Published 2013“…Results also show that most of the essential proteins are close to other proteins, have assortativity behaviour and form clusters/sub-graph in the network.…”
Get full text
Get full text
Get full text
Article -
20
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article
