Search Results - (( java implementation modified algorithm ) OR ( based coding graph algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- graph algorithm »
- based coding »
- coding graph »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review
Published 2018“…The small benchmark graphs will help the researchers to evaluate efficient approximation algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
4
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator: article
Published 2010“…The scope of the paper based on optimal path trace back using graph theory. …”
Get full text
Get full text
Article -
5
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator
Published 2010“…The scope of the paper based on optimal path trace back using graph theory. …”
Get full text
Get full text
Student Project -
6
Regression test case selection & prioritization using dependence graph and genetic algorithm
Published 2014“…The approach is based on optimization of selected test case from dependency analysis of the source codes. …”
Get full text
Get full text
Article -
7
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
8
-
9
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
10
An effective transmit packet coding with trust-based relay nodes in VANETs
Published 2020“…Here, the trust-based graph optimization is performed using Cuckoo search algorithm to select the secure relay nodes. …”
Get full text
Get full text
Get full text
Article -
11
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
12
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
-
15
-
16
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023“…To address these shortcoming issues many security experts use different approaches to detect malware based on various static features. However, by considering only the statistical features, the potential semantic information such as the behavioral feature of the code is overlooked. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Predicting energy consumption pattern based on top trending videos YouTube 2021 using machine learning techniques
Published 2022“…Streamlit.io application was chosen as the website to represent the coding. At the end of this project, a formula equation and graph will be thoroughly discussed and analysed for projecting energy consumption patterns based on the most trending videos on YouTube in 2021.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
19
Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia
Published 2006“…The objective of this study is to develop an algorithm based on the aerosol optical thickness (AOT) for mapping PM1 0 using digital camera and satellite imageries. …”
Get full text
Get full text
Thesis -
20
Partitioning techniques and their parallelization for stiff system of ordinary differential equations
Published 2007“…Parallelizing the right algorithm in the partitioning code will give a better perfonnance with shorter execution times. …”
Get full text
Get full text
Thesis
