Search Results - (( its application _ algorithm ) OR ( code application tools algorithms ))*

Refine Results
  1. 1

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions by Goh, Kwang Yi, Baharom, Salmi, Din, Jamilah

    Published 2022
    “…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
    Get full text
    Get full text
    Article
  3. 3

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al... by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  4. 4
  5. 5
  6. 6

    'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T... by Mohamad Nazim, Jambli, Mohamad Zul Haziq, Mohd Fadzli, Sinarwati, Mohamad Suhaili, Nur Haryani, Zakaria

    Published 2024
    “…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  7. 7

    Multilayers fast mode decision algorithm for scalable video coding: design, implementation, and streaming evaluation on IEEE 802.11g wireless LAN by Maarif, Haris Al Qodri, Gunawan, Teddy Surya

    Published 2011
    “…The advancement and development in video coding technology, together with the increase of storage capacity network infrastructures and computing power are enabling an increasing number of video applications. …”
    Get full text
    Get full text
    Book
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Implementation of wavelet codec by using Texas Instruments DSP TMS320C6701 EVM board by Abd Manap, Nurulfajar

    Published 2001
    “…The capability of the 'C6xx to change the code easily, correct or update applications, reduces the development time, cost and power consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Kodepoly: an engaging approach to blended futuristic learning in coding by Abd Rahman, Norsyafrina, Azhar Amanullah, Ayn Nur Azhana

    Published 2024
    “…By combining the strategic elements of Monopoly with a curriculum comprised of coding challenges, debugging exercises, and algorithmic puzzles, Kodepoly aims to render the learning process both enjoyable and substantial in content. …”
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    A simulation tool for downlink long term evolution-advanced by Mohd. Ramli, Huda Adibah, Sandrasegaran, Kumbesan, Ismail, Ahmad Fadzil, Abdul Latif, Suhaimi, Mohd. Isa, Farah Nadia

    Published 2014
    “…The efficacy of the simulation tool is validated through performance study of a number of well-known packet scheduling algorithms.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
    Get full text
    Get full text
    Thesis
  20. 20