Search Results - (( its application new algorithm ) OR ( its application testing algorithms ))*
Search alternatives:
- application testing »
- testing algorithms »
- its application »
- application new »
- new algorithm »
-
1
-
2
-
3
New algorithm for gyroless spacecraft angular rate Estimation and its application
Published 2006“…The new algorithm performance is investigated and tested against other two filters and has shown much better results when using in both modes (quaternion measurement/low pass filter). …”
Get full text
Get full text
Article -
4
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
5
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
6
A new modified conjugate gradient coefficient for solving system of linear equations
Published 2017“…This paper also includes an application of the new CG algorithm for solving large system of linear equations…”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…The results showed that the collision detection algorithm can be used to support the concept of hardware reconfigurablility of FMC which can be achieved by changing, removing, recombining or rearranging its manufacturing elements in order to meet new demands such as introduction of new product or change.…”
Get full text
Get full text
Thesis -
9
Pairwise Test Data Generation based on Flower Pollination Algorithm
Published 2017“…Currently, researches on Flower Pollination Algorithm (FPA) are very active and its applications have been proven successes to solve many problems. …”
Get full text
Get full text
Get full text
Article -
10
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
11
-
12
HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation
Published 2021“…HABCSm is the first t -way strategy to adopt Hybrid Artificial Bee Colony (HABC) algorithm with Hamming distance as its core method for generating a final test set and the first to adopt the Hamming distance as the final selection criterion for enhancing the exploration of new solutions. …”
Get full text
Get full text
Article -
13
HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation
Published 2021“…HABCSm is the first t -way strategy to adopt Hybrid Artificial Bee Colony (HABC) algorithm with Hamming distance as its core method for generating a final test set and the first to adopt the Hamming distance as the final selection criterion for enhancing the exploration of new solutions. …”
Get full text
Get full text
Article -
14
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Active force control with iterative learning control algorithm for a vehicle suspension
Published 2013“…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
Get full text
Get full text
Thesis -
17
A MODIFIED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR WELLBORE TRAJECTORY DESIGN
Published 2021“…The improvements of the original PSO algorithm are proposed by updating its exploitation phase by incorporating the GWO algorithm because of its strong exploitation capability and the exploration phase using a cellular automaton due to its ability to explore more area by constructing new neighbours. …”
Get full text
Get full text
Thesis -
18
-
19
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
20
