Search Results - (( java implementation bee algorithm ) OR ( using two using algorithm ))
Search alternatives:
- java implementation »
- implementation bee »
- using algorithm »
- bee algorithm »
-
1
Enhance key generation algorithm based user string identity as public key
Published 2015“…This is due to two main reasons: i) this algorithm uses the same modulo value for every E-mail. …”
Get full text
Get full text
Thesis -
2
Whole brain radiation therapy verification using 2D gamma analysis method
Published 2020“…The CC algorithm gave the passing rate of 87.25% using 3 mm/3% (DTA/DD) method than PB algorithm with 79.95%. …”
Get full text
Get full text
Thesis -
3
-
4
Optimization of hydropower reservoir operation based on hedging policy using Jaya algorithm
Published 2023Article -
5
Enhancement of RSA Key Generation Using Identity
Published 2015“…This algorithm used user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Get full text
Book Chapter -
6
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…We introduce two concepts of splitting messages using the scheme in El-Gamal and Massey-Omura algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
7
QoS routing for multiple additive QoS parameters using genetic algorithm
Published 2023Conference paper -
8
Robotic indoor path planning using dijkstra's algorithm with multi-layer dictionaries
Published 2016“…Dijkstra's algorithm is a classic algorithm for finding the shortest path between two points due to its optimisation capability. …”
Get full text
Get full text
Conference or Workshop Item -
9
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The use of the BOGSA algorithm aims to create a new equation for the calculation of the masses of population individuals, as found in the theoretical work in the Strength Pareto Evolutionary Algorithm two (SPEAII) algorithm. …”
Get full text
Get full text
Thesis -
10
AntNet: a robust routing algorithm for data networks
Published 2004“…This paper compares the performance of AntNet2.0 against two other commercially popular algorithms, viz. link state routing algorithm and distant vector routing algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Extensions to the K-AMH algorithm for numerical clustering
Published 2018“…The experimental results prove that the k-AMH Numeric I and k-AMH Numeric II algorithms can be effectively used for numerical clustering. …”
Get full text
Get full text
Get full text
Article -
12
Path planning for unmanned aerial vehicles using visibility line-based methods
Published 2011“…The proposed 2D path planning algorithms, on the contrary, select a relatively smaller number of vertices using the so-called base line (BL), thus they are computationally efficient. …”
Get full text
Get full text
Thesis -
13
-
14
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…Inspired by evolutionary algorithms, which can iteratively find the nearoptimal solution, different Evolutionary Algorithms (EAs) were designed to optimize the producer output weight of the SRBFNN that corresponds to the embedded logic programming 2Satisfiability representation (SRBFNN2SAT). …”
Get full text
Get full text
Get full text
Article -
15
Optimisation of automatic generation control performance in two-area power system with pid controllers using mepso / Lu Li
Published 2018“…Also, using MEPSO-TVAC algorithm, the performance of AGC by using two PID controllers is better in terms of rise time and settling time than using one PID controller. …”
Get full text
Get full text
Get full text
Thesis -
16
Innovative algorithm for easing VIP's navigation by avoiding obstacles and finding safe routes
Published 2023Conference Paper -
17
-
18
-
19
Analysis Of Large In-Plane Displacement And Strain In Rubber Using 2-D Scanner-Based Digital Image Correlation
Published 2017“…The axial strains obtained by using the proposed single-step 2-D SB-DIC algorithm were compared with those obtained using the conventional incremental image correlation algorithm. …”
Get full text
Get full text
Thesis -
20
Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi
Published 2015“…Students then used TRAKLA2to learn five different types of algorithms. …”
Get full text
Get full text
Get full text
Article
