Search Results - (( _ application ((graph algorithm) OR (acs algorithm)) ) OR ( its application usage algorithm ))*
Search alternatives:
- application usage »
- graph algorithm »
- usage algorithm »
- acs algorithm »
-
1
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
Get full text
Get full text
Final Year Project -
2
Path Optimization For Cooperative Multi-Head 3d Printing
Published 2020Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…Then, the parallel genetic algorithm is employed to perform batch retrieval and to accelerate the search in large search space of the Gene Ontology graph. …”
Get full text
Get full text
Get full text
Article -
4
-
5
-
6
-
7
Aplikasi Algoritma Dijkstra dalam Penyelesaian Berbagai Masalah
Published 2021“…The application of Dijkstra's Algorithm in everyday life is very diverse. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Accelerating graph algorithms with priority queue processor
Published 2006Get full text
Get full text
Article -
9
Control of direct multi- input multi-output (MIMO) using single-phase matrix converter (SPMC) topology / Mohd Shukri Mohd Ghazali
Published 2023“…There are numerous studies demonstrating the practical applications of power electronic converters. There are four types of converters, DC-DC, AC-AC, AC-DC, and DC-AC energy conversion. …”
Get full text
Get full text
Thesis -
10
The Winning Percentage In Congkak Using A Randomised Strategy
Published 2024journal::journal article -
11
Graph coloring program of exam scheduling modeling based on bitwise coloring algorithm using python
Published 2022“…The researchers develop a graph coloring algorithm by considering some of the graph vertices to be binary numbers. …”
Get full text
Get full text
Get full text
Article -
12
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
Published 2005“…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
15
Graph-Based Algorithm With Self-Weighted And Adaptive Neighbours Learning For Multi-View Clustering
Published 2024“…To address this issue, this study incorporated joint graph learning from the gmc algorithm into swmcan, creating a new algorithm called swmcan-jg. …”
Get full text
Get full text
Thesis -
16
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…Attack graphs serve as a valuable cybersecurity tool for modeling and analyzing potential attack scenarios on systems, networks, or applications. …”
Review -
20
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
Published 2016“…MVC and MIS are notable for its capability of modelling other combinatorial problems and real-world applications. The aim of this paper is twofold: first to investigate failures of the state-of- the-art algorithms for MVC problem on small graphs and second to propose a simple and efficient approximation algorithm for the minimum vertex cover problem. …”
Get full text
Get full text
Get full text
Article
