Search Results - (( developing interactive competitive algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    A Unified Strategy for Sequence and Sequence-less T-way Test Suite Generation by Abdullah, Nasser, Hujainah, Fadhl, Alsewari, Abdulrahman A., Kamal Z., Zamli

    Published 2016
    “…In the last 20 years, many useful t-way strategies (where t indicates the interaction strength) have been developed to help generate test suite for detecting fault due to interaction of inputs. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    An elitist-flower pollination-based strategy for constructing sequence and sequence-less t-way test suite by Abdullah, Nasser, Kamal Z., Zamli, Alsewari, Abdulrahman A., Ahmed, Bestoun S.

    Published 2018
    “…In line with the upcoming of a new field called search-based software engineering (SBSE), many newly developed t-way strategies adopting meta-heuristic algorithms can be seen in the literature for constructing interaction test suite (such as simulated annealing (SA), genetic algorithm (GA), ant colony optimisation algorithm (ACO), particle swarm optimisation (PSO), harmony search (HS) and cuckoo search (CS). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Compact Convolutional neural network (CNN) based on SincNet for end-to-end motor imagery decoding and analysis by Ahmad Izzuddin, Tarmizi, Mat Safri, Norlaili, Othman, Mohd Afzan

    Published 2021
    “…This paper presents an improved and compact CNN algorithm for motor imagery decoding based on the adaptation of SincNet, which was initially developed for speaker recognition task from the raw audio input. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    Pairwise Test Suite Generation Based on Hybrid Artificial Bee Colony Algorithm by Alazzawi, A.K., Rais, H.M., Basri, S., Alsariera, Y.A.

    Published 2020
    “…Pairwise testing is one of the efficient CTT that used widely for fault detection based on the caused failures by two interactions parameters. There are many researchers that have been developed a pairwise testing strategy. …”
    Get full text
    Get full text
    Article
  8. 8

    Development of two matheuristics for production-inventory-distribution routing problem / Dicky Lim Teik Kyee by Dicky Lim , Teik Kyee

    Published 2018
    “…Both algorithms are tested on a set of 90 benchmark instances with 50, 100 and 200 customers and 20 periods and the results are competitive when compared to the Memetic Algorithm with Population Management (MA|PM), Reactive Tabu Search (RTS) and Scatter Search (SS). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Customer profiling using K-means clustering method / Nik Asyraniasna Nik Mohd Asri by Nik Mohd Asri, Nik Asyraniasna

    Published 2024
    “…The end goal is to provide organizations with an effective tool that helps them better understand their customer segments, enabling them to develop more individualized and successful communication strategies in the context of a competitive market.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Developing framework for natphoric computer-aided web-based kansei engineering / Mohammad Bakri Che Haron by Che Haron, Mohammad Bakri

    Published 2013
    “…To realize the development of computer-aided KE system, a framework for automated KE is designed. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  17. 17

    A fuzzy adaptive teaching learning-based optimization strategy for generating mixed strength t-way test suites by Din, Fakhrud

    Published 2019
    “…Many test data generation strategies based on meta-heuristic algorithms such as Simulated Annealing (SA), Tabu Search (TS), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Harmony Search (HS), Cuckoo Search (CS), Bat Algorithm (BA) and Bees Algorithm have been developed in recent years. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Shared mental model as an enabler of Malaysia waqf land development by Ismail, Nur Azlin, Omar, Ismail, Abu Bakar, Mohamad Noor Ropiah, Suhaili, Nur Aqidah, Hussin, Rohayati

    Published 2017
    “…The adoption and adaption cycle was going so quickly along the waqf land development. 2.SMM also being interacted by other indirect team members. who involves in the WSA development 3. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20