Search Results - (( java application using algorithm ) OR ( software evaluation search algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review by Nuh, Jamal Abdullahi, Koh, Tieng Wei, Baharom, Salmi, Osman, Mohd Hafeez, Kew, Si Na

    Published 2021
    “…Many recent studies have shown that various multi-objective evolutionary algorithms have been widely applied in the field of search-based software engineering (SBSE) for optimal solutions. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Comparative analysis of sine cosine and social network search-based algorithm for software test redundancy reduction optimization by Mekeng, Ambros Magnus Rudolf, Kamal Z., Zamli, Muhammad Zarlis, .

    Published 2024
    “…The User Acceptance Testing (UAT) is an important part of software development. It involves evaluating a software application or system from the user's perspective to validate its operation, usability, and compliance with real-world scenarios. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9

    T-way testing : a test case generator based on melody search algorithm by Toh, Shu Yuen

    Published 2015
    “…Next, TTT-MS will be executed through main algorithms to generate Parameters Interaction List, Parameter Values Interaction List, and finally generate final Test Cases based on Melody Search Algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10
  11. 11
  12. 12

    Comparative Study between Flower Pollination Algorithm and Cuckoo Search Algorithm for t-way Test Data Generation by Abdullah, Nasser, Kamal Z., Zamli

    Published 2018
    “…In order to guide software tester (and engineers in general) to select the best algorithm for the problem at hand, there is a need to evaluate and benchmark the performance of each strategy against common case studies. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    Comparative Performance Analysis of Flower Pollination Algorithm and Harmony Search based strategies: A Case Study of Applying Interaction Testing in the Real World by Nasser, Abdul B., Alsewari, Abdulrahman A., Mu’azu, Aminu A., Kamal Z., Zamli

    Published 2016
    “…In order to guide software tester to choose the best software testing strategy, there is a need to evaluate and benchmark the performance of each strategy against common case studies. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  20. 20