Search Results - (( developing programme bees algorithm ) OR ( java identification method algorithm ))
Search alternatives:
- identification method »
- developing programme »
- java identification »
- method algorithm »
- programme bees »
- bees algorithm »
-
1
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…The main objective of this research is to develop a computer program with capability of manipulating the onlooker bee approaches in ABC Algorithm for solving flowshop scheduling problem. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Predicting usage for a marketable e-learning portal
Published 2014“…To date, existing e-learning portals focuses on providing various learning materials via online.Such an approach may provide huge benefit to the learners; nevertheless, less value can be obtained by the developers or owners.The knowledge transfer programme provides an insight on how existing e-learning portal can be upgraded.The academia has introduced the industry to a computational modelling that is built upon the behaviour of nature community (i.e bees)The utilization of Artificial Bee Colony algorithm in predicting learners' usage of an e-learning portal provides an indicator to the developers on the portals effectiveness.Such information is then useful in producing a marketable and valuable e-learning portal…”
Get full text
Get full text
Conference or Workshop Item -
4
Optimal sizing and location of distributed generation for power loss minimization using bee colony algorithm
Published 2023“…Therefore, a method which is Artificial Bee Colony (ABC) algorithm is proposed in this project for the optimal location and size of DG used in minimizing power losses and improve voltage profile. …”
text::Final Year Project -
5
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…These existing schemes, however, rely on different types of cryptographic methods that usually have high computation complexity. …”
Get full text
Get full text
Thesis
