Search Results - (( using modification graph algorithm ) OR ( java application during algorithm ))
Search alternatives:
- using modification »
- application during »
- java application »
- during algorithm »
- graph algorithm »
-
1
Graph coloring program of exam scheduling modeling based on bitwise coloring algorithm using python
Published 2022“…The researchers develop a graph coloring algorithm by considering some of the graph vertices to be binary numbers. …”
Get full text
Get full text
Get full text
Article -
2
Branch and bound algorithm for finding the maximum clique problem
Published 2018“…Using a modification of a known graph coloring method called heuristic greedy we simultaneously derive lower and upper bounds for the clique number.…”
Get full text
Get full text
Conference or Workshop Item -
3
Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing
Published 2007“…In order to utilize the high performance hardware priority queue module, modifications have to be made on the graph-based shortest path algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…Some researchers addressed the issue of test case prioritization using Genetic Algorithm, but the authors do not select modification-revealing before prioritization and used the same fault severity. …”
Get full text
Get full text
Conference or Workshop Item -
6
Modification of particle swarm optimization algorithm for optimization of discrete values
Published 2011“…We propose a novel modification to the PSO algorithm to perform rapid discrete optimization. …”
Get full text
Get full text
Research Reports -
7
Modification to queueing system M/M/1 with Blum-Blum-Shub generator
Published 2022Get full text
Get full text
Conference or Workshop Item -
8
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
9
Emulation of the Space Robotics System on Earth
Published 2001“…Moreover this instrumental setup for emulation of space robot system can be used for various algorithms study based on robotics, control and other areas.…”
Get full text
Get full text
Thesis -
10
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…The graph theory is used to model the network of the system and to determine the reenergizing path. …”
Get full text
Get full text
Get full text
Thesis -
11
Block backward differentiation formulas for solving first and second order fuzzy differential equations
Published 2016“…The solutions obtained were illustrated by graphs. In conclusion, the numerical results clearly demonstrate the efficiency of using BBDF methods proposed in this study for solving fuzzy differential equations. …”
Get full text
Get full text
Get full text
Thesis -
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
-
14
-
15
-
16
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
17
Development of real and reactive power allocation methods for deregulated power system
Published 2007“…Since current networks are acyclic lossless networks, proportional sharing principle and graph theory is used to trace the relationship between current sources and current sinks. …”
Get full text
Get full text
Get full text
Thesis -
18
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
19
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
