Search Results - (( case detection based algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- detection based »
- case detection »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…Among these selected test cases, the algorithm identifies the redundant test cases based on definition occurrence, if they cover a similar combination of branch coverage except in one branch and also if the test cases cover a similar definition occurrence . …”
Get full text
Get full text
Thesis -
3
Improving test efficiency through multiple criteria coverage based test case prioritization using modified heuristic algorithm
Published 2016“…The fault detection capability of a prioritized test suite is improved up to 15 using Modified PSO which forms the base algorithms for prioritization. …”
Get full text
Get full text
Conference or Workshop Item -
4
Cluster detection for spatio-temporal dengue cases at Selangor districts using multi-EigenSpot algorithm
Published 2022“…Detecting clusters for spatio-temporal cases are becoming important to help hotspots detection for any seasonal outbreaks' cases such as dengue, covid-19, malaria etc. …”
Get full text
Get full text
Conference or Workshop Item -
5
The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases
Published 2015“…This study presents an optimized regression test case prioritization of selected test cases for object-oriented software using Genetic algorithm with different replacement strategies. …”
Get full text
Get full text
Get full text
Article -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
Hybrid anti-islanding algorithm for utility interconnection of distributed generation
Published 2009“…This algorithm is based on two detection schemes; namely active and passive. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
DEVELOPMENT OF OE-BASED BROWN-FORSYTHE TEST ALGORITHM FOR CONTROL VALVE STICTION DETECTION
Published 2018“…Case Study 1 studies three strengths of stiction, which are no stiction (Base Case 1), weak stiction (Case 1.1) and strong stiction (Case 1.2), while Case Study 2 investigates the presence of several sources of process nonlinearities in control loops, which include well-tuned controller (Base Case 2), tight-tuned controller (Case 2.1), presence of external disturbances (Case 2.2) and presence of stiction (Case 2.3).As a result, the proposed method is able to successfully detect and distinguish presence of stiction for both types of inputs at 95% confidence level. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
-
10
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
11
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…Case study evaluation was conducted based on three industrial open source case studies in order to evaluate empirically the significant of the performance of the proposed method. …”
Get full text
Get full text
Get full text
Thesis -
12
Similarity distance measure and prioritization algorithm for test case prioritization in software product line testing
Published 2019“…The goal of this paper is to propose an enhanced string distance and prioritization algorithm which could reorder the test cases resulting to higher rate of fault detection. …”
Get full text
Get full text
Get full text
Article -
13
CS-FuzGA-PTS: Maximizing fault detection through optimizing t-way test suite prioritization based on boundary value analysis
Published 2024“…While there are numerous attempts to systematically generate test cases that maximize input coverage and fault detection, there remains an essential need for prioritizing test cases to ensure efficient utilization of resources. …”
Get full text
Get full text
Get full text
Article -
14
Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.]
Published 2023“…In this study, the method used is K-Means to perform clustering based on area grouping. The implementation of the K-Means Clustering algorithm for detecting the level of spread of COVID-19 data in Indonesia by using the parameter k=3 is quite good with areas in Indonesia that have a high the spread of COVID-19 and the results of the cluster validity test get silhouette values on O = (Total Case, Total Death) and P = (Total Case, Total Death, Total Recovered) have the same cluster value, which is 0.93 which means the cluster quality is very good.…”
Get full text
Get full text
Book Section -
15
Modified damage location indices in beam-like structure: Analytical study
Published 2011“…The modified algorithms are able to detect the damage wherever its location, applying even to cases of multi damage locations. …”
Get full text
Get full text
Article -
16
-
17
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
18
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…The approach is based on optimization of selected test case from test suite T. …”
Get full text
Get full text
Get full text
Article -
19
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…One of the security challenges in Software Defined networking (SON) is Distributed denial of service (DDoS) attacks that overwhelm the controller and consume its resources making it unreachable effecting the connectivity throughout the entire network. To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
20
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014“…The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
