Search Results - (( _ application ((means algorithm) OR (graph algorithm)) ) OR ( its application need algorithm ))*

Refine Results
  1. 1
  2. 2

    A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions by Almazrouei O.S.M.B.H., Magalingam P., Hasan M.K., Shanmugam M.

    Published 2024
    “…Attack graphs serve as a valuable cybersecurity tool for modeling and analyzing potential attack scenarios on systems, networks, or applications. …”
    Review
  3. 3
  4. 4
  5. 5

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…There exist numerous algorithms to address the need of text categorization including Naive Bayes, k-nearest-neighbor classifier, and decision trees. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…There exist numerous algorithms to address the need of text categorization including Naive Bayes, k-nearest-neighbor classifier, and decision trees. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8
  9. 9

    Artificial Bee Colony Algorithm for Pairwise Test Generation by Alazzawi, Ammar K., Homaid, Ameen A. Ba, Alomoush, Alaa A., Alsewari, Abdulrahman A.

    Published 2017
    “…PABC progresses as a means to achieve the effective use of the artificial bee colony algorithm for pairwise testing reduction.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    A Single Objective Flower Pollination Algorithm for Modeling the Horizontal Flexible Plate System by Siti Zakiah, Maseri, Muhamad Sukri, Hadi, Annisa, Jamali, Hanim, Mohd Yatim, Mat Hussin, Ab Talib, Intan Zaurah, Mat Darus

    Published 2020
    “…The gained model in this simulation is approved utilizing the most minimal mean squared error, correlation tests, and pole zero graph stability due to check the robustness of the model. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  12. 12

    Robust overlapping community detection in complex networks with graph convolutional networks and fuzzy C-means by Mohammed Al-Andoli, Mohammed Nasser, Che Ku Mohd, Che Ku Nuraini, Harny, Irianto, Jamil Alsayaydeh, Jamil Abedalrahim, Alwayle, Ibrahim M., Ahmed Abuhoureyah, Fahd Saad

    Published 2024
    “…In this paper, we propose an efficient method called GCNFCM, which utilizes Graph Convolutional Networks (GCNs), Fuzzy C-means (FCM), and the modularity Q algorithm for overlapping community detection. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning by Noor, Ubair, Hassan, Raini, Dwi Handayani, Dini Oktarina

    Published 2025
    “…The preliminary results using the K means Clustering Algorithm showed that the conceptual framework successfully grouped similar data points, facilitating the identification of skyline points. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Generic DNA encoding design scheme to solve combinatorial problems by Rofilde, Hasudungan

    Published 2015
    “…The complexity of combinatorial problems is classified as NP meaning that algorithms are yet to exist to efficiently solve the problem. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Technical report: an application of graph theory in place a sensor at traffic light / Nur Shamimi Saleh Huddin, Nurul Nadiah Abd Ghani and Wan Nur Hafawati Wan Hassan by Saleh Huddin, Nur Shamimi, Abd Ghani, Nurul Nadiah, Wan Hassan, Wan Nur Hafawati

    Published 2016
    “…In this study, the basic application of Graph Theory for Traffic Control is used to develop the compatibility graph, find the minimal edge set and draw the connectivity graph. …”
    Get full text
    Get full text
    Student Project
  18. 18

    A New Unsupervised Validation Index Model Suitable for Energy-Efficient Clustering Techniques in VANET by Abdulrazzak H.N., Hock G.C., Mohamed Radzi N.A., Tan N.M.L.

    Published 2024
    “…These cluster validation indexes focus on the internal or external cluster similarity, and some of them deal with both cases. The employing of graph-based distance to non-spherical clusters and selection of reference points will not be effective all the time because the average distance between reference points and all nodes will be changed dynamically such as in the VANET application. …”
    Article
  19. 19
  20. 20

    Combined generative adversarial network and fuzzy C-means clustering for multi-class voice disorder detection with an imbalanced dataset by Chui, K.T., Lytras, M.D., Vasant, P.

    Published 2020
    “…An automatic diagnosis for voice disorders via machine learning algorithms is desired to reduce the cost and time needed for examination by doctors and speech-language pathologists. …”
    Get full text
    Get full text
    Article