Search Results - (( software detection using algorithm ) OR ( parallel optimization path algorithm ))

Refine Results
  1. 1

    Tool path generation of contour parallel based on ant colony optimisation by Abdullah, Haslina, Ramli, Rizauddin, Abd Wahab, Dzuraidah, Abu Qudeiri, Jaber

    Published 2016
    “…An Ant Colony Optimisation (ACO) method is used to optimize the tool path length because of its capability to find the shortest tool path length. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Real-Time Face Detection And Tracking Using Software And Hardware Design by Chen, Kok Keat

    Published 2018
    “…For FPGA implementation the entire face detection algorithm was implemented on Cyclone IV FPGA device using Altera DE2-115. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Hence, we propose a framework to detect ambiguity on SRS using supervised machine learning technique. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…The results show the algorithm used in this research can reduce the test suite size as well as significantly improve the fault detection effectiveness. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Software User Interface and Algorithm Development for Signal and Noise Characterization by Phoong, Wei Siang

    Published 2015
    “…In my final year project, the purpose of project is reconstruct the I/V converter by using op-amp chip other than LM741 and the algorithm for detect location of photodiode is implement by LabVIEW software. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    A novel large-bit-size architecture and microarchitecture for the implementation of Superscalar Pipeline VLIW microprocessors by Lee, Weng Fook

    Published 2008
    “…Different adder architectures are investigated for suitability on synthesis implementation of large data bus size adder for efficient usage within the ALU. An adder algorithm using repetitive constructs in a parallel algorithm that allows for efficient and optimal synthesis for large data bus size is proposed as a suitable implementation for the adder within the ALU. …”
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18

    Implementing a T-Way Test Generation Strategy Using Bees Algorithm by Mohd Hazli, Mohamed Zabil, Kamal Z., Zamli

    Published 2013
    “…In order to ensure software performance as well as software quality, various testing techniques have been used to detect faults as early and as many as possible during the development phase. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Implementing a t-way test generation strategy using bees algorithm by Zabil M.H.M., Zamli K.Z.

    Published 2023
    “…In order to ensure software performance as well as software quality, various testing techniques have been used to detect faults as early and as many as possible during the development phase. …”
    Article
  20. 20