Search Results - (( basic evaluation using algorithm ) OR ( using application testing algorithm ))
Search alternatives:
- application testing »
- using application »
- testing algorithm »
- basic evaluation »
- evaluation using »
- using algorithm »
-
1
Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems
Published 2016“…SNOW 3G is a stream cipher algorithm used as encryption algorithm in third generation mobile phone technology (3G-UMTS). …”
Get full text
Get full text
Get full text
Article -
2
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…In addition, the mentioned block-matching algorithms are the baseline techniques that have been used to further develop all the enhanced or improved algorithms. …”
Get full text
Get full text
Get full text
Book Chapter -
3
Network analysis for GPS UTMnav system: preliminary stage
Published 2008“…Each algorithm was reviewed and a simulation test was conducted to evaluate the selected algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment
Published 2021“…The algorithm defined in this study was evaluated with manual measurements as reference, and the morphological parameters of the canopy obtained using the LOAM and LeGO-LOAM algorithms as the basic framework were compared. …”
Get full text
Get full text
Get full text
Article -
5
Hybrid artificial bee colony algorithm with branch and bound for two–sided assembly line balancing
Published 2018“…Recently, the artificial bee colony (ABC) algorithm was used in the solution process where it was considered as a very useful, effective and well-known algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
A comparison study of classifier algorithms for mobile-phone’s accelerometer based activity recognition
Published 2012“…Our earlier research has shown that data from mobile-phone embedded accelerometer can be used for activity recognition purpose [1]. As a continuation of the research towards the search for a suitable and reliable algorithm for real-time activity recognition using mobile phone, an evaluation and comparison study of the performance of seven different categories of classifier algorithms in classifying user activities were conducted. …”
Get full text
Get full text
Get full text
Article -
7
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
8
An ensemble feature selection method to detect web spam
Published 2018“…Content features of standard dataset of WEBSPAM-UK2007 are used for evaluation. Bayes network classifier is used along with 70-30% training-testing spilt of dataset. …”
Get full text
Get full text
Get full text
Article -
9
BMTutor research design: Malay sentence parse tree visualization
Published 2014“…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Neural network paradigm for classification of defects on PCB
Published 2003“…Thousands of defective patterns have been used for training, and the neural network is tested for evaluating its performance. …”
Get full text
Get full text
Article -
11
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003“…Secondly, this report will review the literature part which started with basic knowledge of data mining and knowing what the basic information about data mining. …”
Get full text
Get full text
Thesis -
12
Mining The Basic Reproduction Number (R0) Forecast For The Covid Outbreak
Published 2022“…All the classification accuracies obtained were above the baseline accuracy. The COVID-19 Basic Reproduction Number, R0 a predictive model is developed using a linear regression classification algorithm to predict the COVID-19 Basic Reproduction Number, Robased on the actual COVID-19 Basic Reproduction Number, R0. …”
Get full text
Get full text
Monograph -
13
Power System State Estimation In Large-Scale Networks
Published 2010“…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
Get full text
Get full text
Thesis -
14
Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic
Published 2012“…This study proposes blogs search engine adopting RSS syndication using Fuzzy logic. The blogs search engine consists of three main phases which are crawling using RSS feeds algorithm, indexing weblogs algorithm and searching technique with Fuzzy logic. …”
Get full text
Get full text
Get full text
Thesis -
15
Image Splicing Detection With Constrained Convolutional Neural Network
Published 2019“…It is shown that CNN with constrained convolution algorithm can be used as a general image splicing detection task.…”
Get full text
Get full text
Thesis -
16
Evaluation method of rationality of urban landscape facility design based on neural network
Published 2025“…Therefore, this study formulates a scientific and reasonable evaluation index system for the rationality of urban landscape facility design and uses a neural network to carry out intelligent evaluation, in order to obtain optimal evaluation outcomes. …”
Get full text
Get full text
Article -
17
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis -
18
FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES
Published 2013“…This project involves developing features extraction technique of HEp-2 cell of 2 main patterns namely Nucleolar and Centromere using texture and region of interest technique. Next, to design an algorithm that can automatically identify the 2 patterns of the HEp-2 cell tested using ANA. …”
Get full text
Get full text
Final Year Project -
19
-
20
Comparative study of 3D reconstruction methods from 2D sequential images in sports
Published 2020“…In Second stage, based on the advantages found in the first stage of evaluation, three methods were chosen to be evaluated using specific data set. …”
Get full text
Get full text
Get full text
Article
