Search Results - (( java applications security algorithm ) OR ( sequence optimization bees algorithm ))

Refine Results
  1. 1

    Assembly sequence optimization using the bees algorithm by Kamaruddin, Shafie, Azmi, Nabilah, Sukindar, Nor Aiman

    Published 2022
    “…In this study, the assembly sequence of a product was optimized by applying an algorithm known as the Bees Algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  2. 2

    Application of the Bees Algorithm to find optimal drill path sequence by Zainal Abidin, Muhammad Harith, Kamaruddin, Shafie, Adam Malek, Afiqah, Sukindar, Nor Aiman

    Published 2024
    “…These results show that the Bees Algorithm can be an alternative approach to find the optimal drilling sequence.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Optimization of drilling path using the bees algorithm by Kamaruddin, Shafie, Rosdi, Mohamad Naqiuddin, Sukindar, Nor Aiman

    Published 2021
    “…The results comparison shows that the Bees Algorithm achieved comparable performance compared to other algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Evaluating Bees Algorithm for Sequence-based T-way Testing Test Data Generation by M. H., Mohamed Zabil, Kamal Z., Zamli, K. C., Lim

    Published 2018
    “…However, very few strategies have been proposed for sequence-based t-way. This paper presents statistical analysis on the performance of Bees Algorithm against the other sequence t-way strategies, in order to generate test cases.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP by Bibi Aamirah Shafaa Emambocus, Muhammed Basheer Jasser, Muzaffar Hamzah, Aida Mustapha, Angela Amphawan

    Published 2021
    “…Since there is no known polynomial-time algorithm for solving large scale TSP, metaheuristic algorithms such as Ant Colony Optimization (ACO), Bee Colony Optimization (BCO), and Particle Swarm Optimization (PSO) have been widely used to solve TSP problems through their high quality solutions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm by Mohammed Abdullah, Abdullah Nasser

    Published 2018
    “…If t-way strategies are to be adopted in such a system, there is also a need to support test data generation based on sequence of interactions. Addressing these aforementioned issues and complementing the existing sequence based strategies such as t-SEQ, Sequence Covering Array Generator and Bee Algorithm, this thesis presents a unified strategy based on the new meta-heuristic algorithm, called the Elitist Flower Pollination Algorithm (eFPA). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm by Al-Qattan, Zakaria Noor Aldeen Mahmood

    Published 2010
    “…In this project, angles based control with Bees Optimization search algorithm were adopted to search with guidance the protein conformational space in order to find the optimum solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    T-way strategy for sequence input interactions test case generation adopting fish swarm algorithm by Rahman, Mostafijur, Sultana, Dalia, Sabira, Khatun, M. F. M., Jusof, Syamimi Mardiah, Shaharum, Nurhafizah, Abu Talip Yusof, Qaiduzzaman, Khandker M., Hasan, Md. Hasibul, Rahman, Md. Mushfiqur, Hossen, Md. Anwar, Begum, Afsana

    Published 2019
    “…In order to reduce test cases several T-way sequence input interaction strategies are explored, such as, Bee Algorithm(BA), Kuhn encoding (K) , ASP with Clasp , CP with Sugar, Erdem (ER) exact encoding, Tarui (TA) Method, U, UR, D and DR, Brain (BR). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Artificial Bee Colony for Minimizing the Energy Consumption in Mobile Ad Hoc Network by Tareq, M., Abed, S.A., Sundararajan, E.A.

    Published 2019
    “…The aim of this paper is to find the best possible route from the source to the destination based on a method inspired by the searching behaviour of bee colonies, i.e. artificial bee colony (ABC) algorithm. …”
    Get full text
    Get full text
    Article
  13. 13

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Model and metaheuristics for robotic two-sided assembly line balancing problems with setup times by Li, Zixiang, Janardhanan, Mukund Nilakantan, Tang, Qiuhua, Ponnambalam, S. G.

    Published 2019
    “…A comprehensive study with 13 algorithms demonstrates that the two variants of artificial bee colony algorithm and migrating bird optimization algorithm are capable to achieve the optimality for small-size instances and to obtain promising results for large-size instances.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A neural network modal decomposition mechanism in predicting network traffic by Shi Jinmei

    Published 2023
    “…It embeds a new proposed Scalable Artificial Bee Colony (SABC) algorithm, Phase Space Reconstruction, Variational Mode Decomposition (VMD) and an integrated Extreme Learning Machine (ELM). …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain by Hussain, Muhamad Hatta

    Published 2020
    “…Comparative studies have been conducted with respect to Multi-Objective Modified Firefly Algorithm (MOMFA), Multi-Objective Artificial Bees Colony (MOABC) and Multi-Objective Particle Swarm Optimization (MOPSO). …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item