Search Results - (( based generating new algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- based generating »
- java application »
- generating new »
- new algorithm »
-
1
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…Our primary focus revolved around creating a user-friendly desktop application, seamlessly integrating an algorithm that automates result generation for operators. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
5
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
Published 2018“…If t-way strategies are to be adopted in such a system, there is also a need to support test data generation based on sequence of interactions. Addressing these aforementioned issues and complementing the existing sequence based strategies such as t-SEQ, Sequence Covering Array Generator and Bee Algorithm, this thesis presents a unified strategy based on the new meta-heuristic algorithm, called the Elitist Flower Pollination Algorithm (eFPA). …”
Get full text
Get full text
Thesis -
6
Multiple case-based retrieval for university course timetabling problem
Published 2016“…The case-based retrieval technique is further enhanced and improvised into a new algorithm known as Multiple Case-based Retrieval. …”
Get full text
Get full text
Thesis -
7
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
8
Starter Set Generation Based on Factorial Numbers for Half Wing of Butterfly Representation
Published 2021“…This new algorithm is still in the early stage and under development for the generation of the half wing of butterfly representation. …”
Get full text
Get full text
Get full text
Article -
9
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
10
Opposition-based Whale Optimization Algorithm
Published 2018“…In order to improve solution accuracy and reliability, this paper proposes a new algorithm based on WOA. The new algorithm called Opposition-based Whale Optimization (OWOA). …”
Get full text
Get full text
Get full text
Article -
11
A fuzzy adaptive teaching learning-based optimization strategy for generating mixed strength t-way test suites
Published 2019“…Many test data generation strategies based on meta-heuristic algorithms such as Simulated Annealing (SA), Tabu Search (TS), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Harmony Search (HS), Cuckoo Search (CS), Bat Algorithm (BA) and Bees Algorithm have been developed in recent years. …”
Get full text
Get full text
Thesis -
12
A hybrid kidney algorithm strategy for combinatorial interaction testing problem
Published 2022“…HKAS is the first hybrid metaheuristic-based CIT strategy that generates an optimum FTS size with less execution time than the original algorithm-based CIT strategy. …”
Get full text
Get full text
Thesis -
13
NIS-Apriori-based rule generation with three-way decisions and its application system in SQL
Published 2020“…Subsequently, the implementation of the NIS-Apriori algorithm in SQL is described and a few new topics induced by effects of NIS-Apriori-based rule generation are confirmed. …”
Get full text
Get full text
Article -
14
An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme
Published 2021“…In the key generation algorithm of the GGH cryptosystem, the good and bad features of the lattice bases are measured by computing orthogonality-defect value. …”
Get full text
Get full text
Article -
15
Combinatorial test suites generation strategy utilizing the whale optimization algorithm
Published 2020“…Supporting the No Free Lunch theorem, as well as potentially offering new insights into the whole process of t-way generation, this article proposes a new strategy with constraint support based on the Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Article -
16
An Improved Jaya Algorithm-Based Strategy for T-Way Test Suite Generation
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…The specific aims in employing DEAM-based SPCS are to investigate a strategy to resolve the line overloading issue through the N-1 contingency based on the load flow analysis and the severity index develop SPCS scheme through the generation rescheduling strategy based on the hybrid DEAM algorithm. …”
Get full text
Get full text
Thesis -
18
Optimizing S-box generation based on the Adaptive Agent Heroes and Cowards Algorithm
Published 2021“…This paper introduces a new variant of a metaheuristic algorithm based on Agent Heroes and Cowards Algorithm (AHC), called Adaptive Agent Heroes and Cowards Algorithm (AAHC). …”
Get full text
Get full text
Get full text
Article -
19
An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme
Published 2021“…In the key generation algorithm of the GGH cryptosystem, the good and bad features of the lattice bases are measured by computing orthogonality-defect value. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
The normalized random map of gradient for generating multifocus image fusion
Published 2020“…Furthermore, they get difficulties to create the new one. In order to handle this problem, the proposed method a concise algorithm which is able to generate an accurate fused image without using a complicated mathematical equation and tough algorithm. …”
Get full text
Get full text
Get full text
Article
