Search Results - (( developing execution model algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- developing execution »
- validation using »
- execution model »
- model algorithm »
- java validation »
- using algorithm »
-
1
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…Software testing is one of the most critical phases in the software development life cycle model (SDLC), where the quality of a software product is evaluated. …”
Get full text
Get full text
Get full text
Article -
2
Load-Balancing Models for Scheduling Divisible Load on Large Scale Data Grids
Published 2009“…In addition, the integration of the proposed DLT model with Simulated Annealing (SA) algorithm has been also developed. …”
Get full text
Get full text
Thesis -
3
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
4
Modelling of multi-robot system for search and rescue
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
-
6
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
7
A discrete event simulation framework for utility accrual scheduling algorithm in uniprocessor environment
Published 2011“…GUS is one of the existing TUF/UA scheduling algorithms that consider the Time/Utility Function (TUF) of the executed tasks in its scheduling decision. …”
Get full text
Get full text
Get full text
Article -
8
Optimisation model for scheduling MapReduce jobs in big data processing / Ibrahim Abaker Targio Hashem
Published 2017“…The proposed algorithm is evaluated using tasks scheduling in the scheduling load simulator and validated using statistical modeling. …”
Get full text
Get full text
Get full text
Thesis -
9
Development of decentralized data fusion algorithm with optimized kalman filter.
Published 2016“…This thesis proposes a data fusion model that facilitates selection of algorithm and recommends selected algorithm to be optimized. …”
Get full text
Get full text
Thesis -
10
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…Thus, the LDPC code encoder model is developed to identify a low complexity encoding algorithm of LDPC code for the DF protocol relay system. …”
Get full text
Get full text
Get full text
Thesis -
11
Software for modelling the static and dynamic flux linkage - current characteristics of A 6/4 SRM
Published 1996“…Program in C language was developed to validate the algorithm provided by Torrey [5,7].…”
Get full text
Get full text
Student Project -
12
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
13
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
14
Some metaheuristic algorithms for solving multiple cross-functional team selection problems
Published 2022“…We compared the developed algorithms with the MIQP-CPLEX solver on 500 programming contestants with 37 skills and several randomized distribution datasets. …”
Get full text
Get full text
Article -
15
Development of task distribution algorithm for multi-robot coordination system
Published 2022“…During the development process, the simulation environment is modeled with desired task points, robots, and traffic lanes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
17
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
18
A discrete event simulation for utility accrual scheduling in uniprocessor environment
Published 2011“…GUS is one of the existing TUF/UA scheduling algorithms that consider the Time/Utility Function (TUF) of the executed tasks in its scheduling decision in a uniprocessor environment. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Operating a reservoir system based on the shark machine learning algorithm
Published 2018“…In the current study, the shark machine learning algorithm (SMLA) is proposed to develop an optimal rule for operating the reservoir. …”
Get full text
Get full text
Article -
20
Signal Noise Removal using Concurrent Algorithm
Published 2008“…This research is in the early phase to solve the problem of how to develop a signal noise removal process using concurrent algorithm. …”
Get full text
Get full text
Conference or Workshop Item
