Search Results - (( java evaluation case algorithm ) OR ( program internalization based algorithm ))
Search alternatives:
- program internalization »
- internalization based »
- java evaluation »
- evaluation case »
- case algorithm »
-
1
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…To help engineers select the best metaheuristic algorithms for their problems, there is a need to evaluate the performance of different metaheuristic algorithms against each other using common case studies. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…Software testing is one of the most critical phases in the software development life cycle model (SDLC), where the quality of a software product is evaluated. Test case prioritization (TCP) is used to prioritize and schedule test case execution to conduct higher-priority test cases to optimize the software testing process. …”
Get full text
Get full text
Get full text
Article -
3
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019Get full text
Get full text
Get full text
Proceeding Paper -
5
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009Get full text
Get full text
Get full text
Article -
6
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012Get full text
Get full text
Conference or Workshop Item -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. Empirical evaluation was conducted to evaluate the proposed Hybrid Obfuscation Technique. …”
Get full text
Get full text
Thesis -
8
-
9
Control algorithm for two-tank system using multiparametric programming
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
-
12
Implementation of autonomous vehicle navigation algorithms using event-driven programming
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A hybrid intelligent algorithm for solving the bilevel programming models
Published 2011Get full text
Working Paper -
14
-
15
-
16
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…The landslide data together with its conditioning factors (feature variables) collected from three districts in the Central Java Province, Indonesia, has been used as the case study for the LSM. …”
Conference Paper -
17
An optimal mesh algorithm for remote protein homology detection
Published 2011Get full text
Get full text
Article -
18
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015Get full text
Get full text
Conference or Workshop Item -
19
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Case studies were conducted to evaluate the capability of the proposed methods in mitigating shoulder-surfing attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
20
A method for group formation using genetic algorithm
Published 2010Get full text
Get full text
Get full text
Article
