Search Results - (( java implication based algorithm ) OR ( _ intention generating algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Adopting genetic algorithm to enhance state-sensitivity partitioning by Sultan, Ammar Mohammed, Baharom, Salmi, Abd Ghani, Abdul Azim, Din, Jamilah, Zulzalil, Hazura

    Published 2015
    “…Software testing requires executing software under test with the intention of finding defects as much as possible. Test case generation remains the most dominant research in software testing. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Adopting genetic algorithm to enhance state-sensitivity partitioning by Mohammed Sultan, Ammar, Baharom, Salmi, Abd Ghani, Abdul Azim, Din, Jamilah, Zulzalil, Hazura

    Published 2015
    “…Software testing requires executing software under test with the intention of finding defects as much as possible. Test case generation remains the most dominant research in software testing.The technique used in generating test cases may lead to effective and efficient software testing process.Many techniques have been proposed to generate test cases.One of them is State Sensitivity Partitioning (SSP) technique.The objective of SSP is to avoid exhaustive testing of the entire data states of a module. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…The reason is that, SRT algorithm is sensitive to the accuracy of the learned preferences while MGT algorithm can generate Pareto-optimal offers even with an approximation of the learned preferences.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…However, the key question is that, which data best describe the user’s intention to purchase. Many of the algorithms examine user’s past activities and traits to predict the buying intention. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    The application of neural networks and min-max algorithm in digital congkak by Che Pa, Noraziah, Alwi, Asmidah, Mohamed Din, Aniza, Safwan, Muhammad

    Published 2013
    “…To date, there are lots of intentions and efforts made to attract young generations with cultural games by promoting, preserving and cultivating cultural games using myriad mediums such as books, e-books, blogs, social media and portals. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat by Abdul Samat, Syafiq

    Published 2021
    “…However, since this is generative art, result often varies by each render, yet maintain recognizable similarities between the same algorithms. …”
    Get full text
    Get full text
    Book Section
  16. 16
  17. 17

    An adaptive controller of hydro generators for smart grid application in Malaysia by Mohamad, H., Bakar, A.H.A., Ping, H.W., Mokhlis, Hazlie

    Published 2010
    “…In addition, the slow transient response of hydro governor turbine has given a challenge in designing the controller algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack by Izaddoost, Alireza

    Published 2008
    “…To achieve such a goal, this research improves the Intention-driven ICMP traceback model by filtering normal flow in the specific short time and two new algorithms in UDP-based and TCP-based attack are applied. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar by Vijyakumar, Kanendra Naidu

    Published 2015
    “…The graph theory is used to represent the power system based on interconnection between the buses through the adjacency matrix. The edge reduction algorithm is initially applied to reduce the search space to obtain the initial solution. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Effective keyword query structuring using NER for XML retrieval by Roko, Abubakar, Doraisamy, Shyamala, Jantan, Azrul Hazri, Azman, Azreen

    Published 2015
    “…To address these problems, this study allows users to submit a schema independent keyword query, use named Entity Recognition (NER) to categorize query keywords in order to resolve query ambiguities and compute semantic information for a node from its data content. Algorithms were proposed that find user search intentions and convert the intentions into a set of ranked structured queries. …”
    Get full text
    Get full text
    Article