Search Results - (( linear optimization bees algorithm ) OR ( java implementation models algorithm ))

Refine Results
  1. 1

    Indoor comfort and energy consumption optimization using an inertia weight artificial bee colony algorithm by Farah Nur Arina, Baharudin, Nor Azlina, Ab. Aziz, Mohamad Razwan, Abdul Malek, Anith Khairunnisa, Ghazali, Zuwairie, Ibrahim

    Published 2022
    “…Inertia weight artificial bee colony (IW-ABC) algorithms using linearly increasing, linearly decreasing, and exponentially increasing inertia are proposed here for the optimization of the indoor comfort index and energy usage. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Indoor comfort and energy consumption optimization using an inertia weight artificial bee colony algorithm by Farah Nur Arina, Baharudin, Nor Azlina, Ab. Aziz, Mohamad Razwan, Abdul Malek, Anith Khairunnisa, Ghazali, Zuwairie, Ibrahim

    Published 2022
    “…Inertia weight artificial bee colony (IW-ABC) algorithms using linearly increasing, linearly decreasing, and exponentially increasing inertia are proposed here for the optimization of the indoor comfort index and energy usage. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Grey Wolf Optimizer Based Battery Energy Storage System Sizing for Economic Operation of Microgrid by Sukumar S., Marsadek M., Ramasamy A., Mokhlis H.

    Published 2023
    “…Electric batteries; Energy management; Energy management systems; Genetic algorithms; Integer programming; Operating costs; Particle swarm optimization (PSO); Artificial bee colonies (ABC); Battery energy storage systems; battery sizing; Gravitational search algorithm (GSA); Grey Wolf Optimizer; Meta-heuristic optimization techniques; Micro grid; Mixed integer linear programming (MILP); Battery storage…”
    Conference Paper
  4. 4

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Hydroclimatic data prediction using a new ensemble group method of data handling coupled with artificial bee colony algorithm by Basri Badyalina, Nurkhairany Amyra Mokhtar, Nur Amalina Mat Jan, Muhammad Fadhil Marsani, Mohamad Faizal Ramli, Muhammad Majid, Fatin Farazh Ya'acob

    Published 2022
    “…It is rare to find a hydrological application using the group method of data handling (GMDH) model, artificial bee colony (ABC) algorithm, and ensemble technique, precisely predicting ungauged sites. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  7. 7

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Comparative analysis of three approaches of antecedent part generation for an IT2 TSK FLS by Hassan, S., Khanesar, M.A., Jaafar, J., Khosravi, A.

    Published 2017
    “…In this paper, heuristic optimization approaches such as genetic algorithm and artificial bee colony are used to optimize the parameters of the antecedent part of interval type-2 fuzzy logic systems. …”
    Get full text
    Get full text
    Article
  11. 11

    Comfort and energy consumption optimization in smart homes using bat algorithm with inertia weight by Mohamad Razwan, Abdul Malek, Nor Azlina, Ab. Aziz, Alelyani, Salem, Mohana, Mohamed, Farah Nur Arina, Baharudin, Zuwairie, Ibrahim

    Published 2022
    “…Moreover, the comfort level achieved by BA with exponential inertia weight is found to be better than previously reported works using firefly algorithm, genetic algorithm, ant colony optimization, and artificial bee colony algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Energy management system for optimal operation of microgrid consisting of PV, fuel cell and battery / Shivashankar Sukumar by Shivashankar , Sukumar

    Published 2017
    “…The BESS sizing problem is solved using grey wolf optimizer (GWO), particle swarm optimization (PSO), artificial bee colony (ABC), gravitational search algorithm (GSA), and genetic algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15
  16. 16

    Optimal timber transportation planning in tropical hill forest using bees algorithm by Jamaluddin, Jamhuri

    Published 2022
    “…This study proposed a multi-objective linear programming model with Bees algorithm (BA) to find an optimal cost TTP for extraction, forest road, and landing locations. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Model and metaheuristics for robotic two-sided assembly line balancing problems with setup times by Li, Zixiang, Janardhanan, Mukund Nilakantan, Tang, Qiuhua, Ponnambalam, S. G.

    Published 2019
    “…A comprehensive study with 13 algorithms demonstrates that the two variants of artificial bee colony algorithm and migrating bird optimization algorithm are capable to achieve the optimality for small-size instances and to obtain promising results for large-size instances.…”
    Get full text
    Get full text
    Get full text
    Article