Search Results - (( _ application ((graph algorithm) OR (means algorithm)) ) OR ( vr application using algorithm ))*

Refine Results
  1. 1

    A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions by Almazrouei O.S.M.B.H., Magalingam P., Hasan M.K., Shanmugam M.

    Published 2024
    “…Attack graphs serve as a valuable cybersecurity tool for modeling and analyzing potential attack scenarios on systems, networks, or applications. …”
    Review
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Robust overlapping community detection in complex networks with graph convolutional networks and fuzzy C-means by Mohammed Al-Andoli, Mohammed Nasser, Che Ku Mohd, Che Ku Nuraini, Harny, Irianto, Jamil Alsayaydeh, Jamil Abedalrahim, Alwayle, Ibrahim M., Ahmed Abuhoureyah, Fahd Saad

    Published 2024
    “…In this paper, we propose an efficient method called GCNFCM, which utilizes Graph Convolutional Networks (GCNs), Fuzzy C-means (FCM), and the modularity Q algorithm for overlapping community detection. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A Single Objective Flower Pollination Algorithm for Modeling the Horizontal Flexible Plate System by Siti Zakiah, Maseri, Muhamad Sukri, Hadi, Annisa, Jamali, Hanim, Mohd Yatim, Mat Hussin, Ab Talib, Intan Zaurah, Mat Darus

    Published 2020
    “…The gained model in this simulation is approved utilizing the most minimal mean squared error, correlation tests, and pole zero graph stability due to check the robustness of the model. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  9. 9

    The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning by Noor, Ubair, Hassan, Raini, Dwi Handayani, Dini Oktarina

    Published 2025
    “…The preliminary results using the K means Clustering Algorithm showed that the conceptual framework successfully grouped similar data points, facilitating the identification of skyline points. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Generic DNA encoding design scheme to solve combinatorial problems by Rofilde, Hasudungan

    Published 2015
    “…The complexity of combinatorial problems is classified as NP meaning that algorithms are yet to exist to efficiently solve the problem. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Technical report: an application of graph theory in place a sensor at traffic light / Nur Shamimi Saleh Huddin, Nurul Nadiah Abd Ghani and Wan Nur Hafawati Wan Hassan by Saleh Huddin, Nur Shamimi, Abd Ghani, Nurul Nadiah, Wan Hassan, Wan Nur Hafawati

    Published 2016
    “…In this study, the basic application of Graph Theory for Traffic Control is used to develop the compatibility graph, find the minimal edge set and draw the connectivity graph. …”
    Get full text
    Get full text
    Student Project
  13. 13

    A New Unsupervised Validation Index Model Suitable for Energy-Efficient Clustering Techniques in VANET by Abdulrazzak H.N., Hock G.C., Mohamed Radzi N.A., Tan N.M.L.

    Published 2024
    “…These cluster validation indexes focus on the internal or external cluster similarity, and some of them deal with both cases. The employing of graph-based distance to non-spherical clusters and selection of reference points will not be effective all the time because the average distance between reference points and all nodes will be changed dynamically such as in the VANET application. …”
    Article
  14. 14
  15. 15
  16. 16
  17. 17

    REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION by P ISKANDAR, YULITA HANUM

    Published 2006
    “…Heuristic algorithm is an important module widely used for humanoid robots and avatars in VR systems. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A genetic algorithm to minimise the maximum lateness on a single machine family scheduling problem by Lee, Lai Soon, Nazif, Habibeh

    Published 2009
    “…All algorithms are coded in ANSI-C using Microsoft Visual C++ 6.0 as the compiler, and run on a Pentium 4, 2.0 GHz computer with 2.0 GB RAM. …”
    Get full text
    Conference or Workshop Item
  19. 19

    Intelligent technique for grading tropical fruit using magnetic resonance imaging by A. Balogun, Wasiu, Salami, Momoh Jimoh Emiyoka, J. McCarthy, Michael, Mohd Mustafah, Yasir, Aibinu, Abiodun Musa

    Published 2013
    “…Levenberg-Marquardt algorithm (trainlm) gave the best performance fitness out of different types of backpropagation algorithm used with least Mean Square Error (MSE) of 0.0814 corresponding to R-value of 0.8094. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20