Search Results - (( _ application testing algorithm ) OR ( some applications need algorithm ))

Refine Results
  1. 1
  2. 2

    Dijkstra’s algorithm in Product Searching System (ProSearch) / Nur Hasni Nasrudin ... [et al.] by Nasrudin, Nur Hasni, Nasaruddin, Siti Hajar, Syed Abdul Halim, Syarifah Syafiqah Wafa, Ahmad Junid, Rosida

    Published 2015
    “…There are huge numbers of supermarkets these days. Some customers find it difficult for them to get the items that are needed for. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Artificial Bee Colony Algorithm for Pairwise Test Generation by Alazzawi, Ammar K., Homaid, Ameen A. Ba, Alomoush, Alaa A., Alsewari, Abdulrahman A.

    Published 2017
    “…These software applications have many sets of input values, parameters, software/hardware environments and system conditions, which need to be tested to ensure software reliability and quality. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    African buffalo optimization algorithm based t-way test suite generation strategy for electronic-payment transactions by B. Odili, Julius, B. Nasser, Abdullah, A., Noraziah, Abd Wahab, Mohd Helmy, Ahmed, Mashuk

    Published 2022
    “…The need for effectiveness, therefore, necessi�tates the need for algorithm hybridization to deploy only the component parts of algorithms that have been proven to enhance overall search capabilities while at the same time eliminating the demerits of particular algorithms in the hybridiza�tion procedure. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    African Buffalo Optimization Algorithm Based T-Way Test Suite Generation Strategy for Electronic-Payment Transactions by Odili, Julius Beneoluchi, Noraziah, Ahmad, Nasser, Abdullah B., Abd. Wahab, Mohd Helmy, Ahmed, Mashuk

    Published 2021
    “…The need for effectiveness, therefore, necessitates the need for algorithm hybridization to deploy only the component parts of algorithms that have been proven to enhance overall search capa-bilities while at the same time eliminating the demerits of particular algorithms in the hybrid-ization procedure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Identification of non-linear dynamic systems using fuzzy system with constrained membership functions by Yaakob, Mohd. Shafiek

    Published 2004
    “…Main research directions in this field include the complexity reduction of fuzzy models models, structure identification of fuzzy system, and application of new or improved training algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…Thus, the scheme is robust and performed efficiently, and may be used in real-time applications. For future studies, the proposed encryption algorithm can be enhanced by combined compression encryption techniques, which would increase the encryption efficiency. …”
    Get full text
    Get full text
    Thesis
  13. 13

    SRcS: Smartphone Recommendation System using genetic algorithm / Nursalsabiela Affendy Azam by Affendy Azam, Nursalsabiela

    Published 2020
    “…Thus, the objective of the system is to design and develop a progressive web application (PWA) recommendation system for purchasing a smartphone by using genetic algorithm and test the system functionality. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20