Search Results - (( using application testing algorithm ) OR ( basic validation using algorithm ))
Search alternatives:
- application testing »
- using application »
- testing algorithm »
- basic validation »
- validation using »
- using algorithm »
-
1
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
Get full text
Get full text
Thesis -
2
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…A new formulation for the multi-objective optimal power flow (MOOPF) problem that considers DG is introduced. The proposed algorithms have been examined and validated using the IEEE 30-bus and IEEE 118-bus test systems. …”
Get full text
Get full text
Thesis -
3
BMTutor research design: Malay sentence parse tree visualization
Published 2014“…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Investigating and developing the best method in shortest path for implementing a geographical information system (e-map) for Peninsular Malaysia
Published 2005“…Assessment will be done by calculating the algorithm complexion and runtime using the computer. …”
Get full text
Get full text
Monograph -
5
Parametric modelling of a TRMS using dynamic spread factor particle swarm optimisation
Published 2009“…Thus, the usage of dynamic SF is proved experimentally to satisfy main issues of using basic PSO that are trapped in local optima and preservation of diversity. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Developing a prototype e-commerce application with credit card validation and secure transaction
Published 2005“…The application also includes an online credit card validation module that validates credit cards against the Luhn Algorithm and predefined credit card prefixes.The application will accept three types of credit cards which are Mastercard,Visa and American Express.The application is developed on the NET platform using ASP.NET and Visual Basic NET scripting.Therefore,the application could run on all kinds of platform.The application requires a Microsoft Server based operating system and Microsoft SQL Server in order for it to run.The application has been tested and runs successfully both on a server and on a workstation with server settings.In short,this system is the solution to the problems of current e-commerce technology.…”
Get full text
Get full text
Undergraduates Project Papers -
7
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis -
8
AUTO-MANAGE PARKING SYSTEM (AMPS)
Published 2019“…Validation testing also conducted by having 10 drivers to test the system and answering survey question. …”
Get full text
Get full text
Final Year Project -
9
Power System State Estimation In Large-Scale Networks
Published 2010“…Hence. SE requires to use various techniques to ensure validity of the results and to detect and identify sources of errors. …”
Get full text
Get full text
Thesis -
10
Backtracking search algorithm for optimal power dispatch in power system / Mostafa Modiri Delshad
Published 2016“…Backtracking search algorithm (BSA) as the new evolutionary technique of optimization is used for solving the problems. …”
Get full text
Get full text
Thesis -
11
Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic
Published 2012“…This study proposes blogs search engine adopting RSS syndication using Fuzzy logic. The blogs search engine consists of three main phases which are crawling using RSS feeds algorithm, indexing weblogs algorithm and searching technique with Fuzzy logic. …”
Get full text
Get full text
Get full text
Thesis -
12
CFD modeling on coal properties towards the burnout efficiency
Published 2024text::Final Year Project -
13
Mining The Basic Reproduction Number (R0) Forecast For The Covid Outbreak
Published 2022“…All the classification accuracies obtained were above the baseline accuracy. The COVID-19 Basic Reproduction Number, R0 a predictive model is developed using a linear regression classification algorithm to predict the COVID-19 Basic Reproduction Number, Robased on the actual COVID-19 Basic Reproduction Number, R0. …”
Get full text
Get full text
Monograph -
14
Implementation of MRAC, SVMPC and PID control based on direct digital control application for dc servomotor
Published 2005“…The desired behavior of the adaptive controller is expressed by utilizing reference model, and the algorithms have been realized using the Lyapunov method and MIT rules. …”
Get full text
Get full text
Thesis -
15
-
16
3D coordinate transformation using molodensky badekas transformation model: MBT07
Published 2007“…The main objective of this research is to develop a computer program (using Visual Basic 6.0) to determine the 7 parameters used in 3D coordinate transformations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Transtheoretical model of change for weight control in Malaysian context
Published 2010“…However, TIM's potentia1 in weight control has yet to be tested among the natives in Sarawak, Malaysia. This research study used focus groups and survey to evaluate the applicability of TTM for weight control in overweight and obese Bidayuh, Malay and Than adults in saraway Particularly, this study aimed to determine the applicability of the key constructs of TIM: Stages of Change, Self- Efficacy, Decisional Balance and Processes of Change in terms of stage distribution, factorial structure and the relationship between these constructs and the Stages of Change. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
Get full text
Get full text
Article -
20
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…The clustering results have been validated using the F-measure, Entropy and Purity methods of measurement and compared with two common methods, which are information extraction and textual document clustering, for example, K-means, Frequent Item-Set, Hierarchical Clustering Algorithms and Oracle Text. …”
Get full text
Get full text
Thesis
