Search Results - (( developing interactive modified algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- developing interactive »
- interactive modified »
- validation using »
- java validation »
- using algorithm »
-
1
A variable combinatorial test suite strategy based on modified greedy algorithm
Published 2015“…This proposed will suggest a new CIT strategy based on a modified greedy algorithm (MGA) with addressing the supporting of variable strength interaction to generate a satisfactory test suite size.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Whale optimization algorithm strategies for higher interaction strength t-way testing
Published 2022“…To ensure that WOA conquers premature convergence and avoids local optima for large search spaces (owing to high-order interaction), three variants of WOA have been developed, namely Structurally Modified Whale Optimization Algorithm (SWOA), Tolerance Whale Optimization Algorithm (TWOA), and Tolerance Structurally Modified Whale Optimization Algorithm (TSWOA). …”
Get full text
Get full text
Get full text
Article -
3
Modeling the properties of terminal blend crumb rubber modified bitumen with crosslinking additives
Published 2025“…This study aimed to develop models assessing 26 machine-learning algorithms in regression analysis to predict the properties of terminal blend crumb rubber-modified bitumen (TB-CRMB) made with crosslinking additives. …”
Article -
4
Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation
Published 2018“…This algorithm is invariably called the modified greedy algorithm (MGA). …”
Get full text
Get full text
Get full text
Article -
5
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
6
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
7
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
8
Interactive design psychology and artificial intelligence-based innovative exploration of Anglo-American traumatic narrative literature
Published 2022“…Finally, AI technology and ID psychology are used to modify a famous TN work respectively and synergically, and the modified work is appreciated by respondents to collect their comments. …”
Get full text
Get full text
Article -
9
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
11
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…The contribution is Nonlinear Adaptive Interaction Algorithm (NAIA). The controller is developed based on the enhancement and modification of the basic Adaptive Interaction Algorithm Controller (AIA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
MULTIVARIABLE CLOSED-LOOP SYSTEM IDENTIFICATION USING ITERATIVE LEAKY LEAST MEAN SQUARES METHOD
Published 2017“…In this research. novel algorithms have been developed to: (I) isolate the less interacting channe Is using a modified partial correlation algorithm. (2) achieve unbiased and consistent parameter estimates using an iterative LLMS algorithm and (3) develop parsimonious models for closed-loop MIMO systems. …”
Get full text
Get full text
Thesis -
13
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
14
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
15
A study on the efficiency of the object model for a dynamic feedback mechanism in network simulator 2 (NS-2) / Nor Adora Endut, Rozianawaty Osman and Noorazida Mohd Idris
Published 2008“…This project is focused on proposing the utilization of CORBA to develop a middleware having the dynamic interaction mechanism for NS-2. …”
Get full text
Get full text
Research Reports -
16
Fast marching method and modified features fusion in enhanced dynamic hand gesture segmentation and detection method under complicated background
Published 2018“…Recent development in the field of human–computer interaction has led renewed interest in dynamic hand gesture segmentation based on gesture recognition system. …”
Get full text
Get full text
Get full text
Article -
17
Speech enhancement using deep neural network based on mask estimation and harmonic regeneration noise reduction for single channel microphone
Published 2022“…The development of speech-enabled mobile applications has greatly improved human-computer interaction in recent years. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications.
Published 2020“…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
Get full text
Get full text
Get full text
Article -
19
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
A comprehensive analysis of surface electromyography for control of lower limb exoskeleton
Published 2016“…The experiments were conducted on five subjects where the sEMG signals were recorded over four major muscles of the lower limb (Biceps Femoris (BF), Rectus Femoris (RF), Gastrocnemius (Gas) and Soleus (Sol) muscles) along with the kinematics recordings. A novel algorithm to determine the overlapped crosstalk recordings was developed along with a modified low pass filter that adaptively removes these recordings. …”
Get full text
Get full text
Thesis
