Search Results - (( variable using case algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Zamli, Kamal Z., Alsariera, Yazan A.

    Published 2018
    “…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
    Get full text
    Get full text
    Thesis
  4. 4

    KNN Algorithm to Determine Optimum Agricultural Commodities in Smart Farming by Cucus, Ahmad, Al Fahim, Mubarak Ali, Afrig, Aminuddin, Pristyanto, Yoga, Abdulloh, Ferian Fauzi, Zafril Rizal, M. Azmi

    Published 2023
    “…However, sometimes, the matching does not only use variable data types. In some cases, the available variables are string data types. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion by Haque, Ariful

    Published 2018
    “…The algorithms are used to generate test cases for nine different Boolean expressions of different size and complexities. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Neural network based model predictive control for a steel pickling process by Kittisupakorn, P., Thitiyasook, P., Hussain, Mohd Azlan, Daosud, W.

    Published 2009
    “…The Levenberg-Marquardt algorithm is used to train the process models. In the control (MPC) algorithm, the feedforward neural network models are used to predict the state variables over a prediction horizon within the model predictive control algorithm for searching the optimal control actions via sequential quadratic programming. …”
    Get full text
    Get full text
    Article
  9. 9

    A MODIFIED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR WELLBORE TRAJECTORY DESIGN by BISWAS, KALLOL

    Published 2021
    “…During the optimization, the operational constraints of a wellbore such as true vertical depth and casings along with the bounds of tuning variables were utilized. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…In dealing with correlated variables, PCA was embedded in the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Hybrid fuzzy-sliding mode observer design for estimation and advanced control of an ethylene polymerization process / Jarinah Mohd Ali by Jarinah , Mohd Ali

    Published 2017
    “…In this research, a hybrid observer is designed using the combination of artificial intelligence (AI) algorithm and conventional observer. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Modelling and analysis of sensor fault tolerant control using behavioral approach to systems theory by Ng, Peng Hong

    Published 2015
    “…Mathematical models of the plants are first derived through the description of the manifest behavior by elimination of the latent variables via a systematic algorithm. Next, the algorithms for obtaining controllers using pole placement techniques are developed based on specified nominal control laws to retain all the desirable trajectories in the plant behavior while rejecting the undesirable ones. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Development of committee machine models for multiple response optimization problems by Golestaneh, Seyed Jafar

    Published 2014
    “…The fifth methodology proposes the final algorithm which uses four CM models together to solve MRO problems. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimizing the placement of fire department in Kulim using greedy heuristic and simplex method / Muhammad Abu Syah Mohd Suzaly by Mohd Suzaly, Muhammad Abu Syah

    Published 2023
    “…The binary integer programming (BIP) issue is a rare form of integer programming problem in which the value of variable xi is only 0 or 1. In this case, condition xi is also known as a "Binary" or "0 - 1"variable. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…While the firefly algorithm solution is superior, it has a higher time complexity compared to other algorithms used when there are more hidden layers and neurons. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing by S. Ahmed, Bestoun

    Published 2011
    “…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Multi-stage thermal-economical optimization of compact heat exchangers: A new evolutionary-based design approach for real-world problems by Yousefi, M., Darus, A.N., Yousefi, M., Hooshyar, D.

    Published 2015
    “…The complicated task of design optimization of compact heat exchangers (CHEs) have been effectively performed by using evolutionary algorithms (EAs) in the recent years. …”
    Get full text
    Get full text
    Article
  20. 20

    Optimum MV Feeder Routing and Substation siting and rating in Distribution Network by Hasan, Ihsan Jabbar, Ab Ghani, Mohd Ruddin, Gan, Chin Kim

    Published 2014
    “…This paper proposes an evolutionary algorithm to determine the optimum distribution substation placement and sizing by using the particle swarm optimization algorithm and optimum feeder routing using modified minimum spanning tree algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item