Search Results - (( java data generation algorithm ) OR ( basic computing ((use algorithm) OR (bee algorithm)) ))
Search alternatives:
- generation algorithm »
- data generation »
- basic computing »
- use algorithm »
- bee algorithm »
- java »
-
1
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…The research also analyzes the performance of the ABC algorithm using three different onlooker bee approaches. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Sockets programming is one f the most basic and useful method of achieving any client server connectivity. …”
Get full text
Get full text
Thesis -
3
Adaptive mechanism for enhanced performance of shark smell optimization / Nur Atharah Kamarzaman, Shahril Irwan Sulaiman and Intan Rahayu Ibrahim
Published 2021“…Numerical results indicate that the ASSO algorithm strategy outperforms the basic SSO algorithm, Genertic Algorithm (GA), Particle Swarm Intelligence (PSO), Firefly Algorithm (FA), Artificial Bee Colony (ABC) and Teaching Learning Based Optimization (TBLO) in term of reaching for global solution.…”
Get full text
Get full text
Get full text
Article -
4
-
5
-
6
Local search manoeuvres recruitment in the bees algorithm
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
8
-
9
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…In order to solve this problem, a simulation based “Multi-Colony Global Particle Swarm Optimization (MC-GPSO)” algorithm was developed. This algorithm computes the optimal results of objective functions in a scientific manner. …”
Get full text
Get full text
Get full text
Thesis -
10
A random search based effective algorithm for pairwise test data generation
Published 2011“…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
12
EasyA: Easy and effective way to generate pairwise test data
Published 2013“…This paper proposes a matrix based calculation for pairwise test data generation algorithm named EasyA to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Café Web Based System Using Priority Scheduling Approach
Published 2017“…It can be tedious and messy, and can end up with data inconsistency for generating sales report. …”
Get full text
Get full text
Conference or Workshop Item -
14
Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman
Published 2020“…The downside is the computation time on Basic Theta* using grid is way higher compared to A* using NavMesh. …”
Get full text
Get full text
Thesis -
15
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
17
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
19
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
20
