Search Results - (( developing programme bees algorithm ) OR ( java equalization based algorithm ))
Search alternatives:
- developing programme »
- programme bees »
- bees algorithm »
- java »
- equalization »
-
1
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…The main objective of this research is to develop a computer program with capability of manipulating the onlooker bee approaches in ABC Algorithm for solving flowshop scheduling problem. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Predicting usage for a marketable e-learning portal
Published 2014“…To date, existing e-learning portals focuses on providing various learning materials via online.Such an approach may provide huge benefit to the learners; nevertheless, less value can be obtained by the developers or owners.The knowledge transfer programme provides an insight on how existing e-learning portal can be upgraded.The academia has introduced the industry to a computational modelling that is built upon the behaviour of nature community (i.e bees)The utilization of Artificial Bee Colony algorithm in predicting learners' usage of an e-learning portal provides an indicator to the developers on the portals effectiveness.Such information is then useful in producing a marketable and valuable e-learning portal…”
Get full text
Get full text
Conference or Workshop Item -
3
Optimal sizing and location of distributed generation for power loss minimization using bee colony algorithm
Published 2023“…Therefore, a method which is Artificial Bee Colony (ABC) algorithm is proposed in this project for the optimal location and size of DG used in minimizing power losses and improve voltage profile. …”
text::Final Year Project -
4
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…An approach capable of recognizing an audio piece of music with an accuracy equal to 90% was further tested based on this result. …”
Article -
5
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article
