Search Results - (( java implementation graph algorithm ) OR ( program evaluation modified algorithm ))

Refine Results
  1. 1

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…In the benchmark paper, the result of implementation of LACE algorithm in 400, 600, 800 and 1000 servers were plotted at different graphs. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems by Bashar AbedAl Mohdi Talal AlDeeb

    Published 2024
    “…A case study conducted with USIM Tamhidi programs to evaluate the Hybrid-IWD algorithm has produced a successful Tamhidi exam timetable in comparison with manual approach.…”
    thesis::doctoral thesis
  7. 7
  8. 8
  9. 9

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
    Get full text
    Get full text
    Student Project
  10. 10

    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications. by S. Ahmed, Bestoun, Enoiu, Eduard, Afzal, Wasif, Kamal Z., Zamli

    Published 2020
    “…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Lettuce Leaf Disease Detection Using Convolutional Neural Network Algorithm by NGU, SU HANG

    Published 2023
    “…The detection algorithm will be develop based on a modified AlexNet model. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15

    A matlab-based graphical user interface (GUI) to predict the food quality during frying process by Siti Nabihah, Othman

    Published 2022
    “…Then, the sum squared error (SSE) of modified model was compared with the SSE of existing model. …”
    Get full text
    Thesis
  16. 16

    Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis by Arif Mandangan, Muhammad Asyraf Asbullah, Syed Farid Syed Adnan, Mohammad Andri Budiman

    Published 2024
    “…The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis by Mandangan, Arif, Asbullah, Muhammad Asyraf, Adnan, Syed Farid Syed, Budiman, Mohammad Andri

    Published 2024
    “…The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Power system intentional islanding for different contingency scenarios using discrete optimization technique by Nur Zawani Binti Saharuddin

    Published 2023
    “…The performance of the proposed MDEP algorithm was evaluated using the IEEE 30-bus, IEEE 39-bus, and IEEE 118-bus test systems. …”
    text::Thesis
  19. 19

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…These faults are undetectable by existing algorithms with insufficient operation. To date, the main effort in this field of research is to improve fault detection by modifying or adding an operation sequence in the MTA. …”
    Get full text
    Get full text
    Thesis
  20. 20