Search Results - (( software selection parallel algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- selection parallel »
- testing algorithm »
- java application »
-
1
Parallel computation of maass cusp forms using mathematica
Published 2013“…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
-
4
Effective software fault localization based on complex network theory / Abubakar Zakari
Published 2019“…This has led researchers to adopt approaches such as one bug-at-a-time debugging approach (OBA) and parallel debugging approach. However, using OBA debugging approach increases software time-to-delivery and potentially leads to more faults during regression testing, while utilizing k-mean clustering algorithm with Euclidean distance metric to group failed tests based on their execution profile similarity in parallel debugging approach is claimed to be problematic and inappropriate. …”
Get full text
Get full text
Get full text
Thesis -
5
A Community-Based Fault Isolation Approach for Effective Simultaneous Localization of Faults
Published 2019“…A community weighting and a selection mechanism that aids in prioritizing highly important fault-focused communities to the available developers to debug the faults simultaneously in parallel is also proposed. …”
Get full text
Get full text
Article -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
-
8
Diverse cell interaction in dynamic cell sizing and VC-PGA cell priority selection method
Published 2002Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Three phase induction motor coupled to DC motor in hybrid electric vehicle application
Published 2011“…Software in the-loop (SIL) and hardware-in-the-loop (HIL) simulations have been performed for induction motor with electric vehicle load to verify the performance of the new algorithm as well as to tune the control parameters. …”
Get full text
Get full text
Thesis -
10
A New Technique To Design Coating Structure For Energy Saving Glass Using The Genetic Algorithm
Published 2017“…After modifying these shapes using the Genetic algorithm and Parallel Genetic algorithm, the outputs are simulated in the Computer Simulation Technology (CST) simulation software. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
-
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
