Search Results - (( developing effective graph algorithm ) OR ( java evaluation method algorithm ))
Search alternatives:
- method algorithm »
- graph algorithm »
- java evaluation »
-
1
Graph-Based Algorithm With Self-Weighted And Adaptive Neighbours Learning For Multi-View Clustering
Published 2024“…To address the noise problem in multi-view data, this study enhances the gbs method and develops a new self-weighted graph multi-view clustering algorithm (swmcan). …”
Get full text
Get full text
Thesis -
2
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…The approach in the offline phase is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining. …”
Get full text
Get full text
Thesis -
3
Scalable workflow scheduling algorithm for minimizing makespan and failure probability
Published 2019“…Based on the simulation results, the proposed algorithm has improved the overall workflow scheduling effectiveness in comparison with existing algorithms.…”
Get full text
Get full text
Get full text
Get full text
Article -
4
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
An improved directed random walk framework for cancer classification using gene expression data
Published 2020“…In this study, six gene expression datasets are applied to study the effectiveness of the sub-algorithm, directed graph and classifier in SDW in terms of cancer prediction and cancer classification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
7
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…Then, propose an method for handling skyline queries within an incomplete graph database followed by designing and implementing a model to evaluate the efficiency and effectiveness of the proposed approaches. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…In the benchmark paper, the result of implementation of LACE algorithm in 400, 600, 800 and 1000 servers were plotted at different graphs. …”
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
Aco-based feature selection algorithm for classification
Published 2022“…The classification of this type of dataset requires Feature Selection (FS) methods for the extraction of useful information. The modified graph clustering ant colony optimisation (MGCACO) algorithm is an effective FS method that was developed based on grouping the highly correlated features. …”
Get full text
Get full text
Thesis -
11
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…To help engineers select the best metaheuristic algorithms for their problems, there is a need to evaluate the performance of different metaheuristic algorithms against each other using common case studies. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The computational results and comparison with other related tools are presented to show the effectiveness of the proposed algorithm and tools.…”
Get full text
Get full text
Get full text
Article -
13
AUTOMATIC ROUTE FINDER FOR NEW VISITORS
Published 2006“…This study is based on Dijkstra's algorithm as the algorithm finds the most effective way to traverse an entire graph. …”
Get full text
Get full text
Final Year Project -
14
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…An experimental analysis is conducted by several experiments to evaluate the performance of the proposed ensemble methods which has been tested on the 4 benchmark datasets, namely LingSpam, SpamAssassin, Spambase and CSDMC2010. …”
Get full text
Get full text
Thesis -
15
Effect of LiDAR mounting parameters and speed on HDL graph SLAM-Based 3D mapping for autonomous vehicles
Published 2025“…This study investigates the physical calibration of a LiDAR sensor mounted on a moving vehicle and its effect on 3D map generation using the HDL Graph SLAM algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…The AFW algorithm reduces unnecessary computations by focusing only on useful edge entries in the graph, thereby expediting the optimization process. …”
Get full text
Get full text
Get full text
Thesis -
17
Industry 5.0 and Education 5.0: Transforming Vocational Education through Intelligent Technology
Published 2024“…By analyzing the research gaps in personalized learning paths, emotion-driven learning, crossdisciplinary integration, and long-term learning behavior analysis, the paper proposes four improved algorithms: the adaptive learning path generation algorithm, the emotion-driven personalized learning algorithm, the cross-disciplinary knowledge graph algorithm, and the long-term learning behavior prediction algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
20
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…This review emphasizes the effects and consumption of different algorithms in different image processing applications. …”
Get full text
Get full text
Get full text
Article
