Search Results - (( developing data bees algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- developing data »
- bees algorithm »
- data bees »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Data clustering using the bees algorithm
Published 2007“…The authors’ team have developed a new population based search algorithm called the Bees Algorithm that is capable of locating near optimal solutions efficiently. …”
Get full text
Get full text
Conference or Workshop Item -
3
Sequence-based interaction testing implementation using Bees Algorithm
Published 2023“…T-way strategies is used to generate test data to detect faults due to interaction. In the literature, there are many t-way strategies developed by researchers for the past 10 years. …”
Conference paper -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
Adopting Bees Algorithm for Sequenced Based T-Way Test Data Generation
Published 2013“…Using combinatorial method, our strategy adopted Bees Algorithm (BA) to generate the test data for sequence t-way. …”
Get full text
Get full text
Get full text
Article -
6
Enhanced artificial bee colony-least squares support vector machines algorithm for time series prediction
Published 2014“…Upon the completion of data collection and data pre processing, the eABC-LSSVM algorithm is designed and developed. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
9
-
10
A quick gbest guided artificial bee colony algorithm for stock market prices prediction
Published 2018“…The objective of this work is to present a Quick Gbest Guided artificial bee colony (ABC) learning algorithm to train the feedforward neural network (QGGABC-FFNN) model for the prediction of the trends in the stock markets. …”
Get full text
Get full text
Article -
11
PhABC: A Hybrid Artificial Bee Colony Strategy for Pairwise test suite Generation with Constraints Support
Published 2019“…Pairwise testing is one of a powerful Combinatorial Testing Technique (CTT) that used widely for test data generation. Various existing research works were developed using a meta-heuristic algorithm as a basis for pairwise testing strategies. …”
Get full text
Get full text
Conference or Workshop Item -
12
PhABC: A Hybrid Artificial Bee Colony Strategy for Pairwise test suite Generation with Constraints Support
Published 2019“…Pairwise testing is one of a powerful Combinatorial Testing Technique (CTT) that used widely for test data generation. Various existing research works were developed using a meta-heuristic algorithm as a basis for pairwise testing strategies. …”
Get full text
Get full text
Conference or Workshop Item -
13
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
14
Improved tree routing protocol in zigbee networks
Published 2010“…It has been developed for low cost, low data rate and low power consumption. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics
Published 2018“…Optimization is a crucial process to select the best parameters in single and multi-objective problems for manufacturing process.However,it is difficult to find an optimization algorithm that obtain the global optimum for every optimization problem.Artificial Bees Colony (ABC) is a well-known swarm intelligence algorithm in solving optimization problems.It has noticeably shown better performance compared to the state-of-art algorithms.This study proposes a novel hybrid ABC algorithm with β-Hill Climbing (βHC) technique (ABC-βHC) in order to enhance the exploitation and exploration process of the ABC in optimizing carbon nanotubes (CNTs) characteristics.CNTs are widely used in electronic and mechanical products due to its fascinating material with extraordinary mechanical,thermal,physical and electrical properties. …”
Get full text
Get full text
Get full text
Thesis -
18
Solving Traveling Salesman’s Problem Using African Buffalo Optimization, Honey Bee Mating Optimization & Lin-Kerninghan Algorithms
Published 2016“…Results obtained from using these algorithms to solve the benchmark dataset on TSP available in TSPLIB95 serve as the comparative data. …”
Get full text
Get full text
Get full text
Article -
19
System performances analysis of reservoir optimization–simulation model in application of artificial bee colony algorithm
Published 2018“…Therefore, the study proposed the artificial bee colony (ABC) optimization technique to develop an optimal water release policy for the well-known Aswan High Dam, Egypt. …”
Get full text
Get full text
Article -
20
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item
