Search Results - (( java implementation model algorithm ) OR ( sequence optimization bees algorithm ))
Search alternatives:
- implementation model »
- java implementation »
- optimization bees »
- model algorithm »
- bees algorithm »
-
1
Assembly sequence optimization using the bees algorithm
Published 2022“…In this study, the assembly sequence of a product was optimized by applying an algorithm known as the Bees Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
2
Application of the Bees Algorithm to find optimal drill path sequence
Published 2024“…These results show that the Bees Algorithm can be an alternative approach to find the optimal drilling sequence.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Optimization of drilling path using the bees algorithm
Published 2021“…The results comparison shows that the Bees Algorithm achieved comparable performance compared to other algorithms.…”
Get full text
Get full text
Get full text
Article -
4
Evaluating Bees Algorithm for Sequence-based T-way Testing Test Data Generation
Published 2018“…However, very few strategies have been proposed for sequence-based t-way. This paper presents statistical analysis on the performance of Bees Algorithm against the other sequence t-way strategies, in order to generate test cases.…”
Get full text
Get full text
Get full text
Article -
5
An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP
Published 2021“…Since there is no known polynomial-time algorithm for solving large scale TSP, metaheuristic algorithms such as Ant Colony Optimization (ACO), Bee Colony Optimization (BCO), and Particle Swarm Optimization (PSO) have been widely used to solve TSP problems through their high quality solutions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
7
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
Published 2018“…If t-way strategies are to be adopted in such a system, there is also a need to support test data generation based on sequence of interactions. Addressing these aforementioned issues and complementing the existing sequence based strategies such as t-SEQ, Sequence Covering Array Generator and Bee Algorithm, this thesis presents a unified strategy based on the new meta-heuristic algorithm, called the Elitist Flower Pollination Algorithm (eFPA). …”
Get full text
Get full text
Thesis -
8
Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm
Published 2010“…In this project, angles based control with Bees Optimization search algorithm were adopted to search with guidance the protein conformational space in order to find the optimum solution. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
10
T-way strategy for sequence input interactions test case generation adopting fish swarm algorithm
Published 2019“…In order to reduce test cases several T-way sequence input interaction strategies are explored, such as, Bee Algorithm(BA), Kuhn encoding (K) , ASP with Clasp , CP with Sugar, Erdem (ER) exact encoding, Tarui (TA) Method, U, UR, D and DR, Brain (BR). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
12
Artificial Bee Colony for Minimizing the Energy Consumption in Mobile Ad Hoc Network
Published 2019“…The aim of this paper is to find the best possible route from the source to the destination based on a method inspired by the searching behaviour of bee colonies, i.e. artificial bee colony (ABC) algorithm. …”
Get full text
Get full text
Article -
13
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
14
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
15
Model and metaheuristics for robotic two-sided assembly line balancing problems with setup times
Published 2019“…A comprehensive study with 13 algorithms demonstrates that the two variants of artificial bee colony algorithm and migrating bird optimization algorithm are capable to achieve the optimality for small-size instances and to obtain promising results for large-size instances.…”
Get full text
Get full text
Get full text
Article -
16
A neural network modal decomposition mechanism in predicting network traffic
Published 2023“…It embeds a new proposed Scalable Artificial Bee Colony (SABC) algorithm, Phase Space Reconstruction, Variational Mode Decomposition (VMD) and an integrated Extreme Learning Machine (ELM). …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain
Published 2020“…Comparative studies have been conducted with respect to Multi-Objective Modified Firefly Algorithm (MOMFA), Multi-Objective Artificial Bees Colony (MOABC) and Multi-Objective Particle Swarm Optimization (MOPSO). …”
Get full text
Get full text
Thesis -
19
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
