Search Results - (( java implementation modified algorithm ) OR ( using ((test using) OR (code using)) algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- code using »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
2
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
1D Multigrid Solver For Finite Element Method
Published 2022“…The new algorithm also has been tested using time simulation. …”
Get full text
Get full text
Monograph -
5
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…The objectives of this research are to design a fuzzy encoder algorithm to handle the size limitation and static colour problems, to design a fuzzy decoder algorithm to cater for the success rate, speed and static colour issues and to test the algorithms using two different datasets from Yang et al. (2018) and the colour QR codes generated by the proposed FQR code encoder. …”
Get full text
Get full text
Thesis -
6
Steganography algorithm to hide secret message inside an image
Published 2011“…The proposed algorithm uses binary codes and pixels inside an image. …”
Get full text
Get full text
Article -
7
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
8
Study of optimal EG placement in radial distribution system using real coded genetic algorithm
Published 2011“…RCGA is a method that uses continuous floating numbers as representation which is different from conventional GA which is using binary numbers. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
10
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
11
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
12
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
Get full text
Get full text
Thesis -
13
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…The experimental results showed that CrashDroid, which employs the technique considering the code complexity of the action and the use of context data during the test, was more effective than the other automated Android testing tool, AutoDroid, which did not consider the mentioned metrics.…”
Get full text
Get full text
Get full text
Thesis -
14
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
15
A Real-Coded Dynamic Genetic Algorithm For Optimizing Driver’s Model In Emission Test Cycle
Published 2015“…The algorithm is evaluated using two driving cycle data; Japan’s 10-15 mode cycle and Europe’s NEDC. …”
Get full text
Get full text
Get full text
Article -
16
PERFORMANCE COMPARISON OF NON-INTERLEAVED BCH CODES AND INTERLEAVED BCH CODES
Published 2008“…A reduced size or errors from previous is used in the algorithm. A graph similar to the theoretical BER vs SNR is obtained for both interleaved and non-interleaved BCH codes. …”
Get full text
Get full text
Final Year Project -
17
Automatic marking system for programming subject
Published 2023“…To achieve this, this project use cloud compute resources that contain Docker container which act as an isolation for anonymous code execution. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Automatic Additive Manufacturing Product Generation Through Computer Aided Process Planning Using 3D/4D/5D Printing
Published 2022“…Then, the algorithm will be tested whether it can be extended up to 5D printing by using three different types of models with a different printing process. …”
Get full text
Get full text
Monograph -
19
Online Programming Judge System (UOJ)
Published 2013“…Moreover, the mechanism of test cases generation using PSO algorithm is deeply analyzed. …”
Get full text
Get full text
Final Year Project -
20
Extraction of junctions, lines and regions of irregular line drawing : the chain code processing algorithm
Published 2003“…This paper discusses part of the process involved in translating the sketch or irregular line drawing into a tidy or regular line drawing, that yield three important entities namely junction, line and region. The chain code algorithm is used to find these entities. The paper also explains explicit thinning process involved before the chain code methodology. …”
Get full text
Get full text
Get full text
Article
