Search Results - (( based application testing algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application testing »
- application during »
- based application »
- testing algorithm »
- java application »
- during algorithm »
-
1
-
2
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
3
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
5
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
Published 2018“…In order to identify the strength and weakness of these algorithms for MC/DC compliant test cases, this research proposes an experimental study involving four neighborhoods based meta-heuristic algorithms. …”
Get full text
Get full text
Thesis -
6
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Latin hypercube sampling Jaya algorithm based strategy for T-way test suite generation
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Test suite generation based on hybrid flower pollination algorithm and hill climbing
Published 2021“…One of the common application of search-based software testing (SBST) is generating test cases for all objectives characterized by a scope model (e.g. articulations, mutants, branches). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
10
-
11
A fault syndromes simulator for random access memories
Published 2008Get full text
Get full text
Article -
12
-
13
-
14
Pairwise Test Data Generation based on Flower Pollination Algorithm
Published 2017“…Recently, many existing works are focusing on the use of Search-Based algorithms as the basis of the implementation algorithm; however, there is no single strategy that can be the best for all cases. …”
Get full text
Get full text
Get full text
Article -
15
Comparative Analysis of Neighborhood based Meta-heuristic Algorithms for MC/DC Test Data Generation
Published 2016Get full text
Get full text
Conference or Workshop Item -
16
-
17
Hybrid test redundancy reduction strategy based on global neighborhood algorithm and simulated annealing
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. …”
Get full text
Get full text
Get full text
Thesis -
20
