Search Results - (( software validation using algorithm ) OR ( post implementation using algorithm ))

Refine Results
  1. 1

    Artificial neural network (ANN) as post-processing stage for chemically selective field effect transistor (CHEMFET) sensor selectivity based-on ion concentration / Nurhakimah Abd A... by Abd Aziz, Nurhakimah

    Published 2016
    “…In this study, the sensor voltage response was acquired to act as input data while sample concentrations which set from 10"6 to 10"1 mol/L was used as target for training data. The sensor voltage response used has been measured and also generated based on CHEMFET sensor modeling by using MATLAB software. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Security framework based multi agent system architecture to facilitate data fetching from cloud data storage by Mohamed, Amir Mohamed Talib

    Published 2012
    “…The main phases of SecSDLC are investigation, analysis, design, implementation, and testing and validation. An approach that superimposes agents to handle security of CSD is designed using the Prometheus Design Tool (PDT). …”
    Get full text
    Get full text
    Thesis
  3. 3

    An adaptive flower pollination algorithm for minimizing software testing redundancy by M. N., Kabir, Ali, Jahan, Alsewari, Abdulrahman A., Kamal Z., Zamli

    Published 2017
    “…Comparison shows that our algorithm performs slightly better than the existing algorithms and thus, the proposed algorithm can potentially be used by researchers and test engineers to obtain optimal test suite requiring the minimum time for software testing.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6

    Crosssover-first different evolution: a comprehensive post- Hoc analysis by Jason Teo

    Published 2017
    “…Explore a new evolutionary optimization approach using Crossover-First Differential Evolution. Implementation details explained clearly with a comprehensive post-hoc statistical analysis to support the algorithm. …”
    Get full text
    Get full text
    Book
  7. 7

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements by Ishak, Mohammad Hafifi Hafiz

    Published 2013
    “…The method builds upon an approach of the open source visualization software VTK where the data visualizer program ParaView is freely available. By using Red Partitioning of high order elements, the implemented algorithm successfully enables visualization of up to fourth order tetrahedra while using the same data structure for second order tetrahedra as available in ParaView. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An experimental validation and optimisation tool path strategy for thin walled structure by Alsultaney, Hazem K., Mohd Ariffin, Mohd Khairol Anuar, Baharudin, B. T. Hang Tuah, Ali, Aidy, Mustapha, Faizal

    Published 2011
    “…The target was to develop models which mimic the actual cutting process using the finite element method (FEM), to validate the developed tool path strategy algorithm with the actual machining process and to programme the developed algorithm into the software. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Comparative analysis of sine cosine and social network search-based algorithm for software test redundancy reduction optimization by Mekeng, Ambros Magnus Rudolf, Kamal Z., Zamli, Muhammad Zarlis, .

    Published 2024
    “…The User Acceptance Testing (UAT) is an important part of software development. It involves evaluating a software application or system from the user's perspective to validate its operation, usability, and compliance with real-world scenarios. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…Experiments were conducted using k-means, k-medoids and EM-algorithm. The study implements each algorithm using RapidMiner Software and the results generated was validated for correctness in accordance to the concept of external criteria method. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
    Get full text
    Get full text
    Student Project
  13. 13

    Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar by Vijyakumar, Kanendra Naidu

    Published 2015
    “…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. The post-islanding frequency stability is maintained by optimizing the Load Frequency Control‘s parameters. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Regression test case prioritisation (TCP) is used to revalidate modified software, ensuring its quality before release on the digital market. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Automatic generation of user-defined test algorithm description file for memory BIST implementation by Hussin, Razaidi, Jidin, Aiman Zakwan, Loh, Wan Ying, Mispan, Mohd Syafiq, Lee, Weng Fook

    Published 2022
    “…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19

    A Test Vector Minimization Algorithm Based On Delta Debugging For Post-Silicon Validation Of Pcie Rootport by Toh , Yi Feng

    Published 2017
    “…The proposed methodology is inspired by the Delta Debugging algorithm which is has been used in automated software debugging but not in post-silicon hardware debugging. …”
    Get full text
    Get full text
    Thesis
  20. 20