Search Results - (( visualization implementation graph algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- visualization implementation »
- implementation modified »
- implementation graph »
- java implementation »
- graph algorithm »
-
1
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…A tool termed as VIGA-20 (Visualization of Genetic Algorithm using 2-0 Graph) is implemented to accomplish this goal. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM
Published 2023“…Application of mapper algorithm through Kepler Mapper, a python implementation of mapper is done to construct mapper graphs for state wise COVID�19 data in Malaysia along year 2021. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Flexible attribute classification for MDS points / Raihana Kamsiran
Published 2010“…As a case study, visualization on MDS output for multiple response on color preferences is implemented. …”
Get full text
Get full text
Thesis -
9
Using modification of Prim's algorithm and GNU Octave and to solve the multiperiods installation problem
Published 2020“…, and that name is chosen because it is like Unix but differs from Unix because it is free and contains no Unix code. Those algorithms were implemented using 300 randomly generated problems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Interactive Fuzzy Logic Interface for Enhanced Real-Time Water Quality Index Monitoring
Published 2026journal::journal article -
11
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
12
Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran
Published 2021“…Orthometric height is calculated using the Geoid Height derived using the EGM96 Geopotential Model. A scatter graph is outputted displaying the FL, Datetime, and ASE values to visualize the ASE pattern and compliance throughout the flight duration. …”
Get full text
Get full text
Get full text
Thesis -
13
Routing protocols performance on 6LoWPAN IoT networks
Published 2025“…This result is valuable to further implement these protocols in the testbed as well as provide an idea of the algorithmic enhancements.…”
Get full text
Get full text
Get full text
Get full text
Article -
14
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…Then, a new proposed cost aggregation based on the Hybrid Random Aggregation (HA) was implemented that utilized modified Iterative Non-Local Guided Filter (iNLGF), Simple Linear Iterative Clustering (SLIC), Graph Segmentation (GS) and Extended Restart Random Walk (eRWR) for error reduction. …”
Get full text
Get full text
Get full text
Thesis -
15
Concentration and velocity measurement of flowing objects using optical and ultrasonic tomography
Published 2007“…Visual Basic 6.0 is used for software algorithms on concentration and velocity measurement. …”
Get full text
Get full text
Get full text
Thesis -
16
Poverty Classification in Indonesia Using BiGRU, BPNN, and Stacking AdaBoost Frameworks
Published 2024“…The results were promising, demonstrating a substantial improvement in model performance with precision, recall, and F1 scores reaching as high as 0.98, and an overall accuracy of 98.06%. The use of visual analytics, including pie charts and bar graphs, provided a comprehensive distribution analysis of poverty levels, confirming the balanced nature of the dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
20
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
Get full text
Get full text
Thesis
