Search Results - (( developing execution model algorithm ) OR ( java validation using algorithm ))

Refine Results
  1. 1

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…Software testing is one of the most critical phases in the software development life cycle model (SDLC), where the quality of a software product is evaluated. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Load-Balancing Models for Scheduling Divisible Load on Large Scale Data Grids by Abduh Kaid, Monir Abdullah

    Published 2009
    “…In addition, the integration of the proposed DLT model with Simulated Annealing (SA) algorithm has been also developed. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A discrete event simulation framework for utility accrual scheduling algorithm in uniprocessor environment by Ahmad, Idawaty, K. Subramaniam, Shamala, Othman, Mohamed, Ahmad Zukarnain, Zuriati

    Published 2011
    “…GUS is one of the existing TUF/UA scheduling algorithms that consider the Time/Utility Function (TUF) of the executed tasks in its scheduling decision. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Optimisation model for scheduling MapReduce jobs in big data processing / Ibrahim Abaker Targio Hashem by Ibrahim Abaker , Targio Hashem

    Published 2017
    “…The proposed algorithm is evaluated using tasks scheduling in the scheduling load simulator and validated using statistical modeling. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Development of decentralized data fusion algorithm with optimized kalman filter. by Quadri, Sayed Abulhasan

    Published 2016
    “…This thesis proposes a data fusion model that facilitates selection of algorithm and recommends selected algorithm to be optimized. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication by JAM'AAH, SUUD

    Published 2021
    “…Thus, the LDPC code encoder model is developed to identify a low complexity encoding algorithm of LDPC code for the DF protocol relay system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Software for modelling the static and dynamic flux linkage - current characteristics of A 6/4 SRM by Hashim, Mohd Nasir

    Published 1996
    “…Program in C language was developed to validate the algorithm provided by Torrey [5,7].…”
    Get full text
    Get full text
    Student Project
  12. 12

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Some metaheuristic algorithms for solving multiple cross-functional team selection problems by Ngo, S.T., Jaafar, J., Izzatdin, A.A., Tong, G.T., Bui, A.N.

    Published 2022
    “…We compared the developed algorithms with the MIQP-CPLEX solver on 500 programming contestants with 37 skills and several randomized distribution datasets. …”
    Get full text
    Get full text
    Article
  15. 15

    Development of task distribution algorithm for multi-robot coordination system by Sin, Han Bin

    Published 2022
    “…During the development process, the simulation environment is modeled with desired task points, robots, and traffic lanes. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
    Get full text
    Get full text
    Student Project
  18. 18

    A discrete event simulation for utility accrual scheduling in uniprocessor environment by Ahmad, Idawaty, K. Subramaniam, Shamala, Othman, Mohamed, Ahmad Zukarnain, Zuriati

    Published 2011
    “…GUS is one of the existing TUF/UA scheduling algorithms that consider the Time/Utility Function (TUF) of the executed tasks in its scheduling decision in a uniprocessor environment. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Operating a reservoir system based on the shark machine learning algorithm by Allawi, Mohammed Falah, Jaafar, Othman, Mohamad Hamzah, Firdaus, Ehteram, Mohammad, Hossain, Md Shabbir, El-Shafie, Ahmed

    Published 2018
    “…In the current study, the shark machine learning algorithm (SMLA) is proposed to develop an optimal rule for operating the reservoir. …”
    Get full text
    Get full text
    Article
  20. 20

    Signal Noise Removal using Concurrent Algorithm by Hammuzamer Irwan , Hamzah, Azween, Abdullah

    Published 2008
    “…This research is in the early phase to solve the problem of how to develop a signal noise removal process using concurrent algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item