Search Results - (( development process function algorithm ) OR ( java test detection algorithm ))
Search alternatives:
- function algorithm »
- process function »
- test detection »
- java »
-
1
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The TCP process involves optimising test cases by rearranging them effectively to achieve a performance goal, such as early fault detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
5
Image clustering comparison of two color segmentation techniques
Published 2010“…In the software development testing we examine image based clustering, as we can used clustering by distance base, by pixel (red, green, blue) value etc., The problem is solved by region based method which is based on connect component and background detection techniques. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
7
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…Test case prioritization (TCP) is used to prioritize and schedule test case execution to conduct higher-priority test cases to optimize the software testing process. …”
Get full text
Get full text
Get full text
Article -
8
Effort Estimation Model for Function Point Measurement
Published 2007“…Various cost estimation models and methods are available to be used for software development process. The COCOMO, an algorithmic model is one example. …”
Get full text
Get full text
Thesis -
9
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…CAPP functions as the recognizer of the geometric input from CAD and analyse it into specific function for manufacturing purpose in CAM. …”
Get full text
Get full text
Thesis -
10
A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System
Published 2020“…This study aims to develop an algorithm for the AOI system to segment and detect surface defects, requiring low processing power and a small number of learning dataset with labelling error resistance. …”
Get full text
Get full text
Thesis -
11
Computer control of batch process plant (software development)
Published 1995“…The algorithm has been successful tested using the Non-interacting Liquid Level Control of Three lank System plant models transfer function.…”
Get full text
Get full text
Student Project -
12
A block cipher based on genetic algorithm
Published 2016“…The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. There are three functions for each encryption process which are substitution function, crossover and mutation function and add round key function. …”
Get full text
Get full text
Get full text
Thesis -
13
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
Get full text
Get full text
Thesis -
14
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
15
Hybrid artificial immune system-genetic algorithm optimization based on mathematical test functions
Published 2023“…The hybrid includes two processes; firstly, AIS is the attraction among the researchers as the algorithm. …”
Conference paper -
16
-
17
Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column
Published 2005“…A series of algorithms in solving the inverse problem were then developed corresponding to the forward models. …”
Get full text
Get full text
Thesis -
18
A refined differential evolution algorithm for improving the performance of optimization process
Published 2011“…Among the latest Evaluation Algorithm (EA) have been developed is Differential Evolution (DE). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Some metaheuristic algorithms for solving multiple cross-functional team selection problems
Published 2022“…The developed method also demonstrated the effectiveness of the multi-criteria decision-making process when compared with the multi-objective evolutionary algorithm (MOEA). …”
Get full text
Get full text
Article -
20
A video-rate color image segmentation using adaptive and statistical membership function
Published 2010“…Typically, the image segmentation algorithms in video processing system require very high computation power, so it is desirable to develop algorithms for implementation as a real-time system. …”
Get full text
Get full text
Get full text
Article
