Search Results - "Younis, Mohammed I."

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Design and implementation of a t-way test data generation strategy with automated execution tool support by Zamli, Kamal Z., Klaib, Mohammad F.J., Younis, Mohammed I., Isa, Nor Ashidi Mat, Abdullah, Rusli

    Published in Information sciences (01-05-2011)
    “…To ensure an acceptable level of quality and reliability of a typical software product, it is desirable to test every possible combination of input data under…”
    Get full text
    Journal Article
  2. 2

    Design and Implementation of a Scalable RFID-Based Attendance System with an Intelligent Scheduling Technique by Younis, Mohammed I., Al-Tameemi, Zinah Fadhil Abed, Ismail, Widad, Zamli, Kamal Z.

    Published in Wireless personal communications (01-08-2013)
    “…Radio Frequency Identification (RFID) technology; a convenient and flexible technology which is well suited for fully automated systems, is directing human…”
    Get full text
    Journal Article
  3. 3

    Development of Java based RFID application programmable interface for heterogeneous RFID system by Ali, Mohammed F.M., Younis, Mohammed I., Zamli, Kamal Z., Ismail, Widad

    Published in The Journal of systems and software (01-11-2010)
    “…Developing RFID based applications is a painstakingly difficult endeavor. The difficulties include non-standard software and hardware peripherals from vendors,…”
    Get full text
    Journal Article
  4. 4

    Interaction Testing: From Pairwise to Variable Strength Interaction by Zamli, Kamal Z, Younis, Mohammed I

    “…Although desirable as an important activity for quality assurances and enhancing reliability, complete and exhaustive software testing is prohibitively…”
    Get full text
    Conference Proceeding
  5. 5

    Security Problems in an RFID System by Khor, Jing Huey, Ismail, Widad, Younis, Mohammed I., Sulaiman, M. K., Rahman, Mohammad Ghulam

    Published in Wireless personal communications (01-07-2011)
    “…This paper focuses on the security and privacy threats being faced by the low-cost RFID communication system, the most challenging of which relate to…”
    Get full text
    Journal Article
  6. 6

    A Fully Computerized Method to Backup the Router Configuration File by Mohammed I. Younis, Ghassan H. Majeed

    Published in Ai-Khawarizmi engineering journal (01-09-2007)
    “…This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by…”
    Get full text
    Journal Article
  7. 7

    Multi frequency excited MEMS cantilever beam resonator for Mixer-Filter applications by Chandran, Akhil A., Younis, Mohammed I.

    “…Wireless communication uses Radio Frequency waves to transfer information from one point to another. The modern RF front end devices are implementing MEMS in…”
    Get full text
    Conference Proceeding
  8. 8

    G2Way A Backtracking Strategy for Pairwise Test Data Generation by Klaib, M.F.J., Zamli, K.Z., Isa, N.A.M., Younis, M.I., Abdullah, R.

    “…Our continuous dependencies on software (i.e. to assist as well as facilitate our daily chores) often raise dependability issue particularly when software is…”
    Get full text
    Conference Proceeding
  9. 9

    A fully computerized method to backup the router configuration file by Yunus, Muhammad Isam, Abd al-Majid, Ghassan Hamid

    Published in Ai-Khawarizmi engineering journal (2007)
    “…This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by…”
    Get full text
    Journal Article
  10. 10

    Assessing combinatorial interaction strategy for reverse engineering of combinational circuits by Younis, M.I., Zamli, K.Z.

    “…T-way test data generators play an immensely important role for both hardware and software configuration testing. Earlier work concludes that t-way test data…”
    Get full text
    Conference Proceeding
  11. 11

    ITTW: T-way minimization strategy based on intersection of tuples by Younis, M.I., Zamli, K.Z.

    “…Despite being an important activity in the software development cycle (i.e. to ensure quality and reliability), exhaustive testing is prohibitively impossible…”
    Get full text
    Conference Proceeding
  12. 12

    Algebraic strategy to generate pairwise test set for prime number parameters and variables by Younis, M.I., Zamli, K.Z., Isa, N.A.M.

    “…Generating pairwise test set when the total number of variables is prime numbers has a remarkable property in that the test case generation process can be…”
    Get full text
    Conference Proceeding
  13. 13

    A strategy for Grid based t-way test data generation by Younis, M.I., Zamli, K.Z., Isa, N.

    “…Although desirable as an important activity for ensuring quality assurances and enhancing reliability, complete and exhaustive software testing is next to…”
    Get full text
    Conference Proceeding
  14. 14

    Effectiveness of the cumulative vs. normal mode of operation for combinatorial testing by Younis, M I, Zamli, K Z, Othman, R R

    “…This paper discusses the state of the art of applying combinatorial interaction testing (CIT) in conjunction with mutation testing for hardware testing. In…”
    Get full text
    Conference Proceeding
  15. 15

    Generating pairwise combinatorial test set using artificial parameters and values by Younis, M.I., Zamli, K.Z., Isa, N.A.M.

    “…In order to meet market demands for quality software products, software engineers are increasingly under pressure to test more lines of codes. To maintain…”
    Get full text
    Conference Proceeding
  16. 16

    Distributed t-way test suite data generation using exhaustive search method with map and reduce framework by Soh, Zainal Hisham Che, Abdullah, S A C, Zamli, K Z, Younis, M I

    “…In this paper, a new distributed algorithm for generating test suite for t-way testing utilizing a shared tuple space server as transport layer between master…”
    Get full text
    Conference Proceeding