Search Results - (( _ application ((graph algorithm) OR (bayes algorithm)) ) OR ( its application new algorithm ))*
Search alternatives:
- graph algorithm »
- bayes algorithm »
- application new »
- new algorithm »
-
1
Graph-Based Algorithm With Self-Weighted And Adaptive Neighbours Learning For Multi-View Clustering
Published 2024“…To address this issue, this study incorporated joint graph learning from the gmc algorithm into swmcan, creating a new algorithm called swmcan-jg. …”
Get full text
Get full text
Thesis -
2
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2015Get full text
Get full text
Conference or Workshop Item -
3
-
4
-
5
-
6
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
7
-
8
-
9
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…Ever since its introduction into the database community, skyline queries have been widely adopted in a range of contemporary database applications. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
-
12
Sequence t-way test generation using the barnacles mating optimizer algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…Through maximum sized cliques and dummy query generation, more user queries get cloaked within a reasonable amount of time, thereby providing better privacy protection when using LBS applications. The experimental results showed that the proposed cloaking algorithm outperformed existing algorithms such as IClique, OptClique and MMBClique in terms of its cloaking success rate and processing time.…”
Get full text
Get full text
Get full text
Article -
15
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…Through maximum sized cliques and dummy query generation, more user queries get cloaked within a reasonable amount of time, thereby providing cloaked within a reasonable amount of time, thereby providing better privacy protection when using LBS applications. The experimental results showed that the proposed cloaking algorithm out performed existing algorithms such as IClique, OptClique and MMBClique in terms of its cloaking success rate and processing time.…”
Get full text
Get full text
Article -
16
-
17
-
18
-
19
-
20
A 'snowflake' geometrical representation for optimised degree six 3-modified chordal ring networks
Published 2016Get full text
Get full text
Conference or Workshop Item
