Search Results - (( java implementing function algorithm ) OR ( its implementation bees algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    A hybrid algorithm based on artificial bee colony and artificial rabbits optimization for solving economic dispatch problem by Lee, Wei Wen, Hashim, Mohd Ruzaini

    Published 2023
    “…The Artificial Bee Colony (ABC) algorithm has gained widespread attention and has been applied in various fields due to its ability to achieve excellent global optimization results and ease of implementation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…The ABC algorithm is implemented to improve the recommendation accuracy. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A true annealing approach to the marriage in honey-bees optimization algorithm by Teo, Jason Tze Wi, Hussein A. Abbass

    Published 2003
    “…The objective of this paper is to test a conventional annealing approach as the basis for determining the pool of drones. The modified algorithm is tested using a group of randomly generated hard 3-SAT problems to compare its behavior and efficiency against previous implementations. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Optimising a waste management system using the Artificial Bee Colony (ABC) algorithm by Mohamad Fadzil, Nur Hamisha Helanie

    Published 2025
    “…The implementation of ABC algorithm consists of four phases which are initialisation, employed, onlooker and scout bee phases. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Movie recommendation system / Najwa Syamimie Hasnu by Hasnu, Najwa Syamimie

    Published 2020
    “…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Songs Search Using Human Humming Voice by Abdul Rahman, Mohamad Ariff

    Published 2007
    “…The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…E-Certificate helps eliminate many problems that is associated with physical printed certificate such costs, management, and forgery problem. Even though implementation of such E-Certificate have been implemented around the globe, it has not been implemented for workshops in UiTM. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation by Abdulwahhab, Mohanad Mazin

    Published 2019
    “…Firstly, we proposed a multi-criteria artificial bee colony hybrid with particle swarm optimisation algorithm (MC ABC-PSO) for evaluating the information gathered from the mobile nodes in the handover. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Transfer learning in near infrared spectroscopy for stingless bee honey quality prediction across different months by Suarin, Nur Aisyah Syafinaz, Chia, Kim Seng, Mohamad Fuzi, Siti Fatimah Zaharah

    Published 2024
    “…Particularly, the qualities of stingless bee honey are affected by various uncontrolled factors, e.g. ecosystem, origins, and weather. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Deterministic and stochastic inventory routing problems with backorders using artificial bee colony / Huda Zuhrah Ab Halim by Huda Zuhrah , Ab Halim

    Published 2019
    “…The inventory holding cost is assumed to be product specific and only incurred at the assembly plant. An Artificial Bee Colony (ABC) algorithm is proposed for the problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm by Mohammed Abdullah, Abdullah Nasser

    Published 2018
    “…Addressing these aforementioned issues and complementing the existing sequence based strategies such as t-SEQ, Sequence Covering Array Generator and Bee Algorithm, this thesis presents a unified strategy based on the new meta-heuristic algorithm, called the Elitist Flower Pollination Algorithm (eFPA). …”
    Get full text
    Get full text
    Thesis