Search Results - (( developing function using algorithm ) OR ( java evaluation case algorithm ))

Refine Results
  1. 1
  2. 2

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…To help engineers select the best metaheuristic algorithms for their problems, there is a need to evaluate the performance of different metaheuristic algorithms against each other using common case studies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…Software testing is one of the most critical phases in the software development life cycle model (SDLC), where the quality of a software product is evaluated. Test case prioritization (TCP) is used to prioritize and schedule test case execution to conduct higher-priority test cases to optimize the software testing process. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Computing the autopilot control algorithm using predictive functional control for unstable model by H. A., Kasdirin, J. A., Rossiter

    Published 2009
    “…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. Empirical evaluation was conducted to evaluate the proposed Hybrid Obfuscation Technique. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…I used different types of optimization algorithms to improve the performance of the neural networks. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah by Ali, Sadollah

    Published 2013
    “…Metaheuristic algorithms have been extensively used in numerous domains especially in engineering. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…Additionally, the proposed HFP+CI voltage control algorithm has resulted fastest response time; it is 94% faster than using the Fuzzy-PI voltage control algorithm and 6% faster than using the Crisp-PI voltage control algorithm.Hence, it can be concluded that the proposed algorithms have successfully performed their functions by effectively enhancing the operation of the SAPF.…”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A video-rate color image segmentation using adaptive and statistical membership function by Sojodishijani, Omid, Rostami, Vahid, Ramli, Abdul Rahman

    Published 2010
    “…In this algorithm, statistical information of regions is used to create fuzzy membership functions in color model components. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Exam hall allocation using genetic algorithm / Norisyani Binti Fauzai by Fauzai, Norisyani

    Published 2021
    “…In this project an automated exam hall allocation prototype was developed using the genetic algorithm since this algorithm is commonly used to produce high-quality optimization solutions. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan by Abdul Motok@Mohd Ridzuan, Hafeezur Syakir

    Published 2020
    “…The functionality testing is conducted using Blackbox testing technique to test the functionality of the project.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…This research work has generated an algorithmic effort estimation model for function points measurement. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy by Qing, Zhang, Abdullah, Abdul Rashid, Choo, Wei Chong, Ali, Mass Hareeza

    Published 2022
    “…These basic indicators can comprehensively and effectively reflect a country’s or region’s future economic development. The center of radial basis function neural network and smoothing factor to take a uniform distribution of the random radial basis function artificial neural network will be the focus of this study. …”
    Get full text
    Get full text
    Article
  20. 20

    Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin. by Musirin, Ismail

    Published 2004
    “…The FVSI was used as the objective function for the developed optimisation technique. …”
    Get full text
    Get full text
    Thesis