Search Results - (( java implementation using algorithm ) OR ( using network graph algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- using algorithm »
- graph algorithm »
- network graph »
-
1
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…This study employs use Random Forest algorithm to identify and forecast attacks to dynamically locate the attack location in the network for attack graph analysis. …”
Get full text
Get full text
Get full text
Thesis -
2
Evaluation of Visual Network Algorithms on Historical Documents
Published 2020“…The framework has been used to evaluate three graph layout and three graph clustering algorithms on the historical SAGA dataset. …”
Get full text
Get full text
Get full text
Thesis -
3
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The use of network technologies has increased in recent years. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…The evaluation of the performance of these attack graph models using IoT networks or devices as case studies is also emphasized. …”
Review -
5
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
6
A hybrid algorithm for finding shortest path in network routing.
Published 2009“…This wave gives an O( N ) steps quantum algorithm for identifying that record, where was used classical Dijkstra’s algorithm for finding shortest path problem in the graph of network and implement quantum search. …”
Get full text
Article -
7
A GreedyZero algorithm to minimise the conflicts in an Optical Multistage Interconnection Network
Published 2014“…In this paper, we have proposed a new algorithm to minimise the number of conflicts of OMINs using the greedy graph colouring and Zero algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Application of computer based simulation in gas network system using graph theory algorithms and numerical methods
Published 2007“…This is causing the other graph theory algorithms remain least known to users. …”
Get full text
Get full text
Thesis -
9
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
10
A comparative study of greedy algorithms and dynamic programming in road network / Nuralya Sofea Hairulanuar
Published 2024“…The research assesses the efficiency, accuracy, and appropriateness of these algorithms for different kinds of networks, with a specific focus on their use in optimizing travel routes within the road network of Terengganu, Malaysia. …”
Get full text
Get full text
Thesis -
11
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
12
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
13
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
14
A multi-view clustering algorithm for attributed weighted multi-edge directed networks
Published 2022“…Graph clustering acts as a critical topic for solving decision situations in networks. …”
Get full text
Get full text
Article -
15
An analysis of the effect of heterogeneously distributed inertia constant in generation mix power system by using the graph theory and Dijkstra’s Algorithm
Published 2023“…The graph theory network gives the idea about the distance between the nodes and it is helpful to find the share of power from the generating sources. …”
Get full text
Get full text
Get full text
Article -
16
Spanning Tree Transformation of Connected Graph into Single-Row Network
Published 2010“…The spanning tree that is produced from the connected graph is then transformed into single-row network using Tree Sequence Modeling (TSM). …”
Get full text
Get full text
Conference or Workshop Item -
17
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
Published 2012“…Graph colouring is a useful algorithm for channel allocation on wireless local area network (WLAN). …”
Get full text
Get full text
Conference or Workshop Item -
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
20
