Search Results - (( java implementation modified algorithm ) OR ( using ((test using) OR (code using)) algorithm ))

Refine Results
  1. 1

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    1D Multigrid Solver For Finite Element Method by Azhar, Mohamad Amiruddin

    Published 2022
    “…The new algorithm also has been tested using time simulation. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…The objectives of this research are to design a fuzzy encoder algorithm to handle the size limitation and static colour problems, to design a fuzzy decoder algorithm to cater for the success rate, speed and static colour issues and to test the algorithms using two different datasets from Yang et al. (2018) and the colour QR codes generated by the proposed FQR code encoder. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Steganography algorithm to hide secret message inside an image by Ibrahim, Rosziati, Teoh, Suk Kuan

    Published 2011
    “…The proposed algorithm uses binary codes and pixels inside an image. …”
    Get full text
    Get full text
    Article
  7. 7

    Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Study of optimal EG placement in radial distribution system using real coded genetic algorithm by M. H., Sulaiman, Omar, Aliman

    Published 2011
    “…RCGA is a method that uses continuous floating numbers as representation which is different from conventional GA which is using binary numbers. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  11. 11

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  12. 12

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…The experimental results showed that CrashDroid, which employs the technique considering the code complexity of the action and the use of context data during the test, was more effective than the other automated Android testing tool, AutoDroid, which did not consider the mentioned metrics.…”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A Real-Coded Dynamic Genetic Algorithm For Optimizing Driver’s Model In Emission Test Cycle by Zeratul Izzah, Mohd Yusoh, Hisashi, Tamaki, Kazuhide, Togai

    Published 2015
    “…The algorithm is evaluated using two driving cycle data; Japan’s 10-15 mode cycle and Europe’s NEDC. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    PERFORMANCE COMPARISON OF NON-INTERLEAVED BCH CODES AND INTERLEAVED BCH CODES by MOHD. NURI, NUR DIANA

    Published 2008
    “…A reduced size or errors from previous is used in the algorithm. A graph similar to the theoretical BER vs SNR is obtained for both interleaved and non-interleaved BCH codes. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…To achieve this, this project use cloud compute resources that contain Docker container which act as an isolation for anonymous code execution. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Automatic Additive Manufacturing Product Generation Through Computer Aided Process Planning Using 3D/4D/5D Printing by Ilias, Izzah Nadhilah

    Published 2022
    “…Then, the algorithm will be tested whether it can be extended up to 5D printing by using three different types of models with a different printing process. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Online Programming Judge System (UOJ) by Tran , Quang Trung

    Published 2013
    “…Moreover, the mechanism of test cases generation using PSO algorithm is deeply analyzed. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Extraction of junctions, lines and regions of irregular line drawing : the chain code processing algorithm by Haron, Habibollah, Mohamed, Dzulkifli, Shamsuddin, Siti Mariyam

    Published 2003
    “…This paper discusses part of the process involved in translating the sketch or irregular line drawing into a tidy or regular line drawing, that yield three important entities namely junction, line and region. The chain code algorithm is used to find these entities. The paper also explains explicit thinning process involved before the chain code methodology. …”
    Get full text
    Get full text
    Get full text
    Article