Search Results - (( java applications security algorithm ) OR ( sequence optimization bees algorithm ))
Search alternatives:
- java applications »
- optimization bees »
- bees algorithm »
-
1
Assembly sequence optimization using the bees algorithm
Published 2022“…In this study, the assembly sequence of a product was optimized by applying an algorithm known as the Bees Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
2
Application of the Bees Algorithm to find optimal drill path sequence
Published 2024“…These results show that the Bees Algorithm can be an alternative approach to find the optimal drilling sequence.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Optimization of drilling path using the bees algorithm
Published 2021“…The results comparison shows that the Bees Algorithm achieved comparable performance compared to other algorithms.…”
Get full text
Get full text
Get full text
Article -
4
Evaluating Bees Algorithm for Sequence-based T-way Testing Test Data Generation
Published 2018“…However, very few strategies have been proposed for sequence-based t-way. This paper presents statistical analysis on the performance of Bees Algorithm against the other sequence t-way strategies, in order to generate test cases.…”
Get full text
Get full text
Get full text
Article -
5
An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP
Published 2021“…Since there is no known polynomial-time algorithm for solving large scale TSP, metaheuristic algorithms such as Ant Colony Optimization (ACO), Bee Colony Optimization (BCO), and Particle Swarm Optimization (PSO) have been widely used to solve TSP problems through their high quality solutions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
Published 2018“…If t-way strategies are to be adopted in such a system, there is also a need to support test data generation based on sequence of interactions. Addressing these aforementioned issues and complementing the existing sequence based strategies such as t-SEQ, Sequence Covering Array Generator and Bee Algorithm, this thesis presents a unified strategy based on the new meta-heuristic algorithm, called the Elitist Flower Pollination Algorithm (eFPA). …”
Get full text
Get full text
Thesis -
7
Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm
Published 2010“…In this project, angles based control with Bees Optimization search algorithm were adopted to search with guidance the protein conformational space in order to find the optimum solution. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
T-way strategy for sequence input interactions test case generation adopting fish swarm algorithm
Published 2019“…In order to reduce test cases several T-way sequence input interaction strategies are explored, such as, Bee Algorithm(BA), Kuhn encoding (K) , ASP with Clasp , CP with Sugar, Erdem (ER) exact encoding, Tarui (TA) Method, U, UR, D and DR, Brain (BR). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
11
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
12
Artificial Bee Colony for Minimizing the Energy Consumption in Mobile Ad Hoc Network
Published 2019“…The aim of this paper is to find the best possible route from the source to the destination based on a method inspired by the searching behaviour of bee colonies, i.e. artificial bee colony (ABC) algorithm. …”
Get full text
Get full text
Article -
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
15
Model and metaheuristics for robotic two-sided assembly line balancing problems with setup times
Published 2019“…A comprehensive study with 13 algorithms demonstrates that the two variants of artificial bee colony algorithm and migrating bird optimization algorithm are capable to achieve the optimality for small-size instances and to obtain promising results for large-size instances.…”
Get full text
Get full text
Get full text
Article -
16
A neural network modal decomposition mechanism in predicting network traffic
Published 2023“…It embeds a new proposed Scalable Artificial Bee Colony (SABC) algorithm, Phase Space Reconstruction, Variational Mode Decomposition (VMD) and an integrated Extreme Learning Machine (ELM). …”
Get full text
Get full text
Get full text
Thesis -
17
Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain
Published 2020“…Comparative studies have been conducted with respect to Multi-Objective Modified Firefly Algorithm (MOMFA), Multi-Objective Artificial Bees Colony (MOABC) and Multi-Objective Particle Swarm Optimization (MOPSO). …”
Get full text
Get full text
Thesis -
18
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
19
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
20
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item
