Search Results - seen ((graph algorithm) OR (drops algorithm))
Search alternatives:
- graph algorithm »
- seen »
-
1
Examination timetabling for undergraduate programme using graph coloring approach / Norarida Abd Rhani ... [et al.]
Published 2021“…Any clashes of timetabling that arise can be detected and remedied immediately. An algorithm based on Graph coloring technique is one of the feasible solutions that can address these issues of managing timetables. …”
Get full text
Get full text
Get full text
Article -
2
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
3
Extrema Points Application In Determining Iris Region Of Interest
Published 2019“…The valid ROI was found from the probabilities graph of the SVM obtained by looking at the global minimum conditions determined by a second derivative model in a graph of functions. …”
Get full text
Get full text
Get full text
Article -
4
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…Additionally, we find that some algorithms are more sensitive to data leakage than others, as seen by the drop in model accuracy when built without leakage. …”
Get full text
Get full text
Article -
5
Performance monitoring algorithm for optimizing electrical power generated by using photovoltaic system
Published 2016Get full text
Get full text
Conference or Workshop Item -
6
Mixed convection in a lid-driven cavity in the presence of magnetic field with sinusoidal heating
Published 2024“…It is found that Ha has a significant effect on the heat transfer process and fluid flow. It can be seen clearly when the value of Ha = 30, the rate of heat transfer dropped significantly on the cold wall. …”
Get full text
Get full text
Get full text
Article -
7
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Nevertheless, throughput is much improved at the detriment of bandwidth, as seen fiom the number of dropped packets. Thus, it. is recommended that user authentication be applied to mobile Internet Protocol version 6 (IPv6) as a security measure. …”
Get full text
Get full text
Thesis
