Search Results - (( java execution between algorithm ) OR ( program implementation bees algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Offline study on loss optimization in distribution networks using Artificial Bee Colony (ABC) algorithm: article / Deezex Noor Ainizaa Abdullah by Abdullah, Deezex Noor Ainizaa

    Published 2009
    “…This paper present offline study on loss optimization in distribution networks using Artificial Bee Colony (ABC) algorithm. The study involves the development of Artificial Bee Colony (ABC) algorithm to implement loss minimization in a distribution system. …”
    Get full text
    Get full text
    Article
  2. 2

    Offline study on loss optimization in distribution networks using Artificial Bee Colony (ABC) algorithm / Deezex Noor Ainizaa Abdullah by Abdullah, Deezex Noor Ainizaa

    Published 2009
    “…This paper present offline study on loss optimization in distribution networks using Artificial Bee Colony (ABC) algorithm. The study involves the development of Artificial Bee Colony (ABC) algorithm to implement loss minimization in a distribution system. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…In ELB algorithm, the tasks are distributed among resources based on their execution time range. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali by Mohamed Kamali, Mohd Zahurin

    Published 2015
    “…In this thesis, we implement the modified ant colony programming (ACP) algorithm for solving the matrix Riccati differential equation (MRDE). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Deterministic and stochastic inventory routing problems with backorders using artificial bee colony / Huda Zuhrah Ab Halim by Huda Zuhrah , Ab Halim

    Published 2019
    “…A new MILP for DSIRPB is formulated and used within the algorithm. The DSIRPB is modeled as stochastic dynamic programming and solved using hybrid rollout algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Computational intelligence of probabilistic simulation in demand side management for avoided utility cost improvisation in a generation operating system planning / Daw Saleh Sasi M... by Mohammed, Daw Saleh Sasi

    Published 2016
    “…In order produce a global optimal solution of AUC, the self-adaptive strategy was proposed to serve as a new mutation technique responsible to provide a new population for discrete artificial bee colony. The newly designed algorithm is termed as the discrete artificial bee colony associated with selfadaptive strategy (DABCSAS). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Grey Wolf Optimizer for Solving Economic Dispatch Problems by Wong, Lo Ing, M. H., Sulaiman, Mohd Rusllim, Mohamed, Hong, Mee Song

    Published 2014
    “…In addition, the three main steps of hunting, searching for prey, encircling prey, and attacking prey, are implemented. The algorithm is then benchmarked on 20 generating units in economic dispatch, and the results are verified by a comparative study with Biogeography-based optimization (BBO), Lambda Iteration method (LI), Hopfield model based approach (HM), Cuckoo Search (CS), Firefly, Artificial Bee Colony (ABC), Neural Networks training by Artificial Bee Colony (ABCNN), Quadratic Programming (QP) and General Algebraic Modeling System (GAMS). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Computational intelligence of probabilistic simulation in demand side management for avoided utility cost improvisation in a generation operating system planning / Daw Saleh Sasi M... by Sasi Mohamme, Daw Saleh

    Published 2017
    “…In order produce a global optimal solution of AUC, the self-adaptive strategy was proposed to serve as a new mutation technique responsible to provide a new population for discrete artificial bee colony. The newly designed algorithm is termed as the discrete artificial bee colony associated with selfadaptive strategy (DABCSAS). …”
    Get full text
    Get full text
    Book Section
  10. 10
  11. 11

    Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar by Vijyakumar, Kanendra Naidu

    Published 2015
    “…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain by Hussain, Muhamad Hatta

    Published 2020
    “…The Electric Transient and Analysis Program (ETAP) was used as the simulation tool, while Matrices Laboratory (MATLAB) was utilized to implement all the algorithms in this study. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…String Distance aims to find the degree of similarity between the test cases, which helps prioritize the test case according to the dissimilar value. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A study on obstacle detection for IoT based automated guided vehicle (AGV) by Loh, Jit Hao, M. Nafis, O. Z.

    Published 2022
    “…Experiment results show the vehicle movement reaction in dealing with obstacles. Next, the KF programming algorithm managed to diminish the measurement noise including the Main bang and flaw echo of the ultrasonic sensor. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The proposed DetectCombined is an innovated technique that execute a protection code based on a sequence of three stages: filtration-validation-history, this technique produces a robust protection code that distinguish between safe SQL commands and malicious ones, and reinforce the memory of detection procedure by saving previous SQL attacks in special tables in the remote database, regardless of the types of users whether a general user of admin. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong by Chong, Chun Yong

    Published 2016
    “…Effective execution of software maintenance requires knowledge of the detailed working of software. …”
    Get full text
    Get full text
    Thesis