Search Results - ((((((drop algorithm) OR (graph algorithm))) OR (tree algorithm))) OR (_ algorithm))
Search alternatives:
- graph algorithm »
- drop algorithm »
- tree algorithm »
-
1
A quantum algorithm for minimal spanning tree
Published 2008“…Classical algorithms involve searching over some space for finding the minimal spanning tree problem in a graph. …”
Get full text
Get full text
Conference or Workshop Item -
2
Synthesis of transistor-chaining algorithm for CMOS cell layout using bipartite graph / Azizi Misnan
Published 1997“…This bound enables us to prune the search tree efficiently. The algorithm will be implemented and tested in this project using C language. …”
Get full text
Get full text
Thesis -
3
A comparative analysis of Prim, Kruskal, and Reverse-Delete algorithms in optimizing routes within Terengganu’s and Pahang’s attraction road network / Munashahira Mohammad Zahid
Published 2024“…The Reverse-Delete algorithm works in reverse; it starts with the full graph and iteratively removes the largest edges, ensuring that the graph remains connected. …”
Get full text
Get full text
Thesis -
4
Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob
Published 2014Subjects: Get full text
Get full text
Thesis -
5
A hybrid algorithm for finding shortest path in network routing.
Published 2009“…This wave gives an O( N ) steps quantum algorithm for identifying that record, where was used classical Dijkstra’s algorithm for finding shortest path problem in the graph of network and implement quantum search. …”
Get full text
Article -
6
Guidance system based on Dijkstra-ant colony algorithm with binary search tree for indoor parking system
Published 2021“…However, the traditional Dijkstra’s is not accurate and need more time to perform the path in order it should visit all the nodes in the graph. In this paper, the Dijkstra-ant colony algorithm (ACO) with binary search tree (BST) has been proposed. …”
Get full text
Get full text
Get full text
Article -
7
Vegetation height estimation near power transmission poles via satellite stereo images using 3D depth estimation algorithms
Published 2023“…Dynamic programming; Electric lines; Electric utilities; Graph algorithms; Graphic methods; Poles; Power transmission; Remote sensing; Satellites; Stereo image processing; Transmissions; Vegetation; 3D depth approach; Graph cut; QuickBird satellite; Satellite sensors; Stereo matching; Outages…”
Conference Paper -
8
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010Subjects: Get full text
Get full text
Thesis -
9
-
10
Vegetation height estimation near power transmission poles via satellite stereo images using 3D depth estimation algorithms
Published 2015“…Our results show that Graph-Cut Algorithm performs better than dynamic programming (DP) in terms of accuracy and speed.…”
Get full text
Get full text
Conference or Workshop Item -
11
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…Minimum Spanning Tree (MST), the most functional algorithm, described exclusively by the undirected graph in which all nodes are connected. …”
Get full text
Get full text
Get full text
Article -
12
Spanning Tree Transformation of Connected Graph into Single-Row Network
Published 2010“…Path-Growing Tree-Forming algorithm applied with Vertex-Prioritized is contained in the model to produce the spanning tree from the connected graph. …”
Get full text
Get full text
Conference or Workshop Item -
13
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
Published 2011“…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
Get full text
Get full text
Thesis -
14
On some packing and partition problems in geometric graphs
Published 2018“…An algorithm for computing such plane perfect matchings is also presented. …”
Get full text
Get full text
Thesis -
15
Using modification of Prim's algorithm and GNU Octave and to solve the multiperiods installation problem
Published 2020“…Two algorithms (WWM1 and WWM2) are proposed for solving this problem. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
Modeling of static and dynamic components of bio-nanorobotic systems
Published 2012“…In addition, a graph algorithm based on greedy methods is employed to compute a new set of optimal weighted electronic properties of the fullerenes via computing their Minimum Weight Spanning Trees (MWSTs). …”
Get full text
Get full text
Thesis -
17
A matrix approach for minimum spanning tree in neutrosophic and application in medical waste management / Nur Haifa Ahmad Hayazim, Siti Nurain Zulkifli and Siti Nurhidayah Yaacob
Published 2022“…A numerical example related to finding the optimal route that can minimize the cost of solving the medical waste management is provided to show the effectiveness of the Prim's and Kruskal's algorithms with IVBN. As a final step, a comparative study such as interval-valued neutrosophic minimum spanning tree (IVN-MST), interval-valued intuitionistic fuzzy minimum spanning tree (IVIF-MST) and interval-valued fuzzy minimum spanning tree (IVE-MST) is presented to point out the advantages of the proposed method over that of other existing algorithms. …”
Get full text
Get full text
Student Project -
18
Nano-scale VLSI clock routing module based on useful-skew tree algorithm
Published 2006“…We implemented Useful-Skew Tree (UST) algorithm which is based on the deferred-merge embedding (DME) paradigm, as the clock layout synthesis engine. …”
Get full text
Get full text
Article -
19
-
20
Benchmark simulator with dynamic environment for job scheduling in grid computing
Published 2014“…Job scheduling algorithm has a significant influence on grid computing performance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
