Search Results - (( based application testing algorithm ) OR ( iot applications ant algorithm ))

Refine Results
  1. 1

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. In this paper, an ant colony optimization (ACO) based WSN routing algorithm for IoT has been proposed and analyzed to enhance scalability, to accommodate node mobility and to minimize initialization delay for time critical applications in the context of IoT to find the optimal path of data transmission, improvising efficient IoT communications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3
  4. 4

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion by Haque, Ariful

    Published 2018
    “…In order to identify the strength and weakness of these algorithms for MC/DC compliant test cases, this research proposes an experimental study involving four neighborhoods based meta-heuristic algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Test suite generation based on hybrid flower pollination algorithm and hill climbing by Nasser, Abdullah B., Nor Wardah, Mohd Nasir, Kamal Zuhairi, Zamli, Waheeda Ali, H. M. Ghanem, Fakhrud, Din

    Published 2021
    “…One of the common application of search-based software testing (SBST) is generating test cases for all objectives characterized by a scope model (e.g. articulations, mutants, branches). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Pairwise Test Data Generation based on Flower Pollination Algorithm by Nasser, Abdullah B., Alsewari, Abdulrahman A., Tairan, Nasser M., Kamal Z., Zamli

    Published 2017
    “…Recently, many existing works are focusing on the use of Search-Based algorithms as the basis of the implementation algorithm; however, there is no single strategy that can be the best for all cases. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20

    Compiler-based prefetching algorithm for recursive data structure by Anuar, Nurulhaini

    Published 2007
    “…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis