Search Results - (( developing activation generation algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- developing activation »
- activation generation »
- generation algorithm »
- validation using »
- java validation »
- using algorithm »
-
1
An improved algorithm in test case generation from UML activity diagram using activity path
Published 2011“…This paper proposed an improved algorithm to automatically generate test cases directly from UML activity diagram using an activity graph.This algorithm has been implemented as a prototype using UML activity diagrams as inputs to generate test cases.These generated test cases are generated automatically are compared to test cases that are generated manually in order to evaluate the algorithm’s usability and reliability.The result shows that the test cases generated by the developed test case generator program are the same as the one manually derived.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
3
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
4
Vehicle ride performance with semi-active suspension system using modified skyhook algorithm and current generator model
Published 2008“…A controller known as modified skyhook algorithm and current generator model was used in the semi-active suspension system. …”
Get full text
Get full text
Article -
5
Development of a Tuneable Test Problem Generator for Assembly Sequence Planning and Assembly Line Balancing
Published 2012“…However, there is a scarcity in works that focus on developing problems to test these algorithms. In optimisation algorithm development, testing algorithms by a broad range of test problems is crucial to identify their strengths and weaknesses. …”
Get full text
Get full text
Get full text
Article -
6
Active power optimization based on non adaptive immune algorithm: article
Published 2010“…The aim of active power optimization is to reduce the power loss by controlling the active power scheduling on the generators. …”
Get full text
Get full text
Article -
7
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…In previous work, an Adaptive Linear Neuron (ADALINE) based extraction algorithm has been developed to generate reference currents. …”
Get full text
Get full text
Thesis -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
9
Effort Estimation Model for Function Point Measurement
Published 2007“…This research work has generated an algorithmic effort estimation model for function points measurement. …”
Get full text
Get full text
Thesis -
10
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
12
Predictive models for hotspots occurrence using decision tree algorithms and logistic regression.
Published 2013“…The results show that the C4.5 algorithm has better performance than the ID3 algorithm in terms of accuracy and the number of generated rules. …”
Get full text
Get full text
Get full text
Article -
13
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
14
Unified neural network controller of series active power filter for power quality problems mitigation
Published 2013“…This thesis presents the design, development and analysis of series active power filter (APF) with a novel control technique. …”
Get full text
Get full text
Thesis -
15
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
16
Multi leader particle swarm optimization for optimal placement and sizing of multiple distributed generation for a micro grid
Published 2023“…A comprehensive analysis was performed on a developed system in order to demonstrate the effect of a single and multitude of DGs on active power loss and the variation of the voltage profile. …”
text::Thesis -
17
Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices
Published 2021“…Around the world, the demand is increasing due to industrial activity and advances in both developing and developed countries. …”
Get full text
Get full text
Thesis -
18
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
19
GEOGIRA II : Pendekatan ke arah rekabentuk berbantukan komputer
Published 1992“…The Computer Aided Design (CAD) is a branch of applied mathematics dealing with the study and development of algorithms for the generation of curves and surfaces using computer graphics. …”
Get full text
Get full text
Conference or Workshop Item -
20
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…It is noted that active user intervention increases the acceleration of Genetic Algorithm towards an optimal solution. …”
Get full text
Get full text
Thesis
