Search Results - (( developing security bee algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Honey bee based trust management system for cloud computing by Firdhous, Mohamed, Ghazali, Osman, Hassan, Suhaidi, Harun, Nor Ziadah, Abas, Azizi

    Published 2011
    “…In this paper, the authors propose the concept that honey bee algorithm which has been developed to solve complex optimization problems can be successfully used to address this issue.The authors have taken a closer look at the optimization problems that had been solved using the honey bee algorithm and the similarity between these problems and the cloud computing environment.Thus concluding that the honey bee algorithm could be successfully used to solve the trust management issue in cloud computing.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3
  4. 4
  5. 5

    Localisation of inspection probes in a storage tank by Rosli, Nurmi Elisya, Sophian, Ali, Ashraf, Arselan

    Published 2021
    “…The techniques that can give some better performances in terms of accuracy have been investigated and developed. In this paper, ZigBee IEEE 802.15.4 wireless communication protocols are used to implement an indoor localization application system. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain by Hussain, Muhamad Hatta

    Published 2020
    “…The objectives of the studies are to develop a new optimization technique termed as Modified Firefly Algorithm (MFA) for minimizing the relay operating time, to develop a Multi-Objective Modified Firefly Algorithm (MOMFA) for minimizing both the total relay operating time and relay coordination time and to develop an integrated optimal predictor termed as Modified Firefly Algorithm-Artificial Neural Network (MFA-ANN) for accurate prediction of relay operating time. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10