Search Results - (( development programme bee algorithm ) OR ( java data normalization algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches by Mohd Pauzi, Nur Fazlinda

    Published 2015
    “…The main objective of this research is to develop a computer program with capability of manipulating the onlooker bee approaches in ABC Algorithm for solving flowshop scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Predicting usage for a marketable e-learning portal by Yaacob, Aizan, Yusof, Yuhanis, Sheik Osman, Wan Rozaini, Derashid, Chek, Omar Khan, Zainizad

    Published 2014
    “…To date, existing e-learning portals focuses on providing various learning materials via online.Such an approach may provide huge benefit to the learners; nevertheless, less value can be obtained by the developers or owners.The knowledge transfer programme provides an insight on how existing e-learning portal can be upgraded.The academia has introduced the industry to a computational modelling that is built upon the behaviour of nature community (i.e bees)The utilization of Artificial Bee Colony algorithm in predicting learners' usage of an e-learning portal provides an indicator to the developers on the portals effectiveness.Such information is then useful in producing a marketable and valuable e-learning portal…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Optimal sizing and location of distributed generation for power loss minimization using bee colony algorithm by Mohamad Zunnurain Fauzi

    Published 2023
    “…Therefore, a method which is Artificial Bee Colony (ABC) algorithm is proposed in this project for the optimal location and size of DG used in minimizing power losses and improve voltage profile. …”
    text::Final Year Project
  5. 5

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis