Search Results - (( java implementation _ algorithm ) OR ( using computing ((use algorithm) OR (bee algorithm)) ))

Refine Results
  1. 1

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The JSP, JavaScript, Java and MySQL have been employed to improve manual ordering management. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches by Mohd Pauzi, Nur Fazlinda

    Published 2015
    “…The research also analyzes the performance of the ABC algorithm using three different onlooker bee approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Neural Network Training Using Hybrid Particle-move Artificial Bee Colony Algorithm for Pattern Classification by Nuaimi, Zakaria Noor Aldeen Mahmood Al, Abdullah, Rosni

    Published 2017
    “…Traditional neural networks algorithms such as Back Propagation (BP) were used for ANNT, but they have some drawbacks such as computational complexity and getting trapped in the local minima. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Neural network training using hybrid particle-move artificial bee colony algorithm for pattern classification by Al Nuaimi, Zakaria Noor Aldeen Mahmood, Abdullah, Rosni

    Published 2017
    “…By optimizing the training of the neural networks using optimal weight set, better results can be obtained by the neural networks.Traditional neural networks algorithms such as Back Propagation (BP) were used for ANNT, but they have some drawbacks such as computational complexity and getting trapped in the local minima.Therefore, evolutionary algorithms like the Swarm Intelligence (SI) algorithms have been employed in ANNT to overcome such issues.Artificial Bees Colony (ABC) optimization algorithm is one of the competitive algorithms in the SI algorithms group. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Protein Conformantional Search Using Bees Algorithm by Bahamish, Hesham Awadh A., Abdullah, Rosni, Salam, Rosalina Abdul

    Published 2008
    “…To this end, an energy function is used to calculate its energy and a conformational search algorithm is used to search the conformational search space to find the lowest free energy corformation.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Global gbest guided-artificial bee colony algorithm for numerical function optimization by Shah, Habib, Tairan, Nasser, Garg, Harish, Ghazali, Rozaida

    Published 2018
    “…Numerous computational algorithms are used to obtain a high performance in solving mathematics, engineering and statistical complexities. …”
    Get full text
    Get full text
    Article
  17. 17

    Application of the bees algorithm to the selection features for manufacturing data by Pham, D.T, Mahmuddin, Massudi, Otri, S., Al-Jabbouli, H.

    Published 2007
    “…A “wrapper” feature selection method using the Bees Algorithm and Multilayer Perception (MLP) networks is described in this paper. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers