Search Results - (( java implication based algorithm ) OR ( software implementation re algorithm ))
Search alternatives:
- software implementation »
- implication based »
- implementation re »
- java implication »
- re algorithm »
-
1
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
Published 2018“…We have chosen four neighborhood based algorithms which are commonly used in optimization problems and divided them in newly implemented and re-implemented category. …”
Get full text
Get full text
Thesis -
2
Comparative Analysis of Neighborhood based Meta-heuristic Algorithms for MC/DC Test Data Generation
Published 2016“…In order to help test engineers to make informed decision on the best neighborhood based implementations, this paper investigates the size and time performance of two MC/DC test strategies re-implementation based on Simulated Annealing against two newly developed strategies based on Great Deluge and Late Acceptance Hill Climbing algorithms respectively. …”
Get full text
Get full text
Conference or Workshop Item -
3
Optimization Of Fuzzy Logic Controllers With Genetic Algorithm For Two-Part-Type And Re-Entrant Production Systems
Published 2008“…The optimized GDF and GSF can be used in real implementations. GDF and GSF controllers are evaluated for two test cases namely “two-part-type production line” and “re-entrant production system”. …”
Get full text
Get full text
Thesis -
4
Design and analysis of sequence generator module using eulerian path algorithm for DNA fragment assembly / Mustaqim Mohd Subri
Published 2013“…For FPGA design flow, RTL schematic, synthesis schematic and simulation are done using Xilinx Vivado software. For ASIC design flow, VCS is used to re-verify the DNASGM module, DC is used to re-synthesis the DNASGM with additional constraints and PT for performing STA on the DNASGM. …”
Get full text
Get full text
Student Project -
5
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
Get full text
Get full text
Thesis -
6
Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof
Published 2021“…It is strongly suggested to implement Enhanced 3D-AES in software applications to secure data transmission.…”
Get full text
Get full text
Thesis -
7
-
8
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…It involves the process of re-testing software after modifications. Ideally, to perform regression testing is to re-execute all the test cases on the modified software. …”
Get full text
Get full text
Thesis -
9
Crypto Embedded System for Electronic Document
Published 2006“…In this paper, a development of low-cost RSA-based Crypto Embedded System targeted for electronic document security is presented. The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
10
-
11
-
12
-
13
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
14
-
15
-
16
