Search Results - (( java application customization algorithm ) OR ( software verification _ algorithm ))

Refine Results
  1. 1

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3
  4. 4

    Face recognition for identify verification in exams locations by Ng, Suet Eng

    Published 2023
    “…It also needs to be fast for quick verification. The project uses a mix of hardware and software tools. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…There is also an analysis that been done which is the verification of the algorithm in the developed application and the comparison between a different interpolation method. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review by Nuh, Jamal Abdullahi, Koh, Tieng Wei, Baharom, Salmi, Osman, Mohd Hafeez, Kew, Si Na

    Published 2021
    “…The preliminary results show that remarkable studies were reported without considering performance metrics for the purpose of algorithm evaluation. Based on the 27 performance metrics that were identified, hypervolume, inverted generational distance, generational distance, and hypercube-based diversity metrics appear to be widely adopted in most of the studies in software requirements engineering, software design, software project management, software testing, and software verification. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…Traditional Encryption Algorithms are implemented in software base because of the complexities involved in the operations. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Standalone PV solar using LED flood light for street lighting by Amedan, Rubiatul Adawiah

    Published 2017
    “…This work presents the designing and simulating the PV modules by using Perturb and Observe algorithm to track maximum power point. To develop PV system with this P&O algorithm, this system is constructed and simulates using MATLAB Simulink software. …”
    Get full text
    Get full text
    Student Project
  13. 13

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…The contributions of this study straddle research perspectives of enhancing Regression Testing with Particle Swarm-Artificial Bee Colony Algorithm, and practical perspectives by providing software testing practitioners the TCP framework that can facilitate and accelerate the production of high-quality software products by revealing faults early and reducing time, cost, and human efforts through automation.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Compatible Pair of Nontrivial Actions for Some Cyclic Groups of 2-Power Order by Sahimel Azwal, Sulaiman, Mohd Sham, Mohamad, Yuhani, Yusof

    Published 2015
    “…Some necessary and sufficient number theoretical conditions for a pair of cyclic groups of 2-power order with nontrivial actions act compatibly on each other are used to investigate some properties to find the exact number of compatible pairs of actions. Algorithms in Groups, Algorithms and Programming (GAP) software are constructed to create more examples on selected case. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…The results of the verification of the system algorithm on the simulated 3D areal surface topography of a sloped bumps shows that the system algorithm can effectively identified the edges features and segmented them following the shape partem of the surface features of the sloped bumps. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Modeling And Control Of V-Groove Rotary Impact Driver by Leong, Chi Hoe

    Published 2020
    “…A state-flow control algorithm is developed on the model to improve the mentioned shortfalls. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana by Prajadhiana, Keval Priapratama

    Published 2024
    “…On analysing the distortion effect by means of numerical computation method, a commercial specialized simulation software Simufact.Welding was used in the development of the numerical model. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A Test Vector Minimization Algorithm Based On Delta Debugging For Post-Silicon Validation Of Pcie Rootport by Toh , Yi Feng

    Published 2017
    “…The proposed methodology is inspired by the Delta Debugging algorithm which is has been used in automated software debugging but not in post-silicon hardware debugging. …”
    Get full text
    Get full text
    Thesis