Search Results - (( program implementation level algorithm ) OR ( parallel optimization bees algorithm ))

Refine Results
  1. 1

    Performance Comparison of Parallel Bees Algorithm on Rosenbrock Function by Hammash, Nayif Mohammed

    Published 2012
    “…This thesis presents the parallel Bees Algorithm as a new approach for optimizing the last results for the Bees Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Energy-aware scheduling optimization in hybrid flow shops using artificial bee colony algorithm by Mohd Abdul Hadi, Osman, Mohd Fadzil Faisae, Ab Rashid, Nik Mohd Zuki, Nik Mohamed, Muhammad Ammar, Nik Mu’tasim

    Published 2024
    “…Through an extensive computational experiment involving a well-known benchmark suite, the ABC algorithm demonstrated remarkable performance, consistently outperforming several popular metaheuristic algorithms, including Genetic Algorithms, Particle Swarm Optimization, Memetic Algorithms, and Whale Optimization Algorithm in 75% of the problems. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Control algorithm for two-tank system using multiparametric programming by Zakaria, A., Mid, E.C., Mohamed, M.F., Hussin, M.H.M., Shaari, A.S., Ruslan, Eliyana, Hadi, Dayanasari, Masri, M.

    Published 2023
    “…In conclusion, the implementation of multiparametric programming is able to estimate the value of the output for the control algorithm of the two-tank system.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8
  9. 9

    Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom by Masrom, Suraya

    Published 2015
    “…However, in many cases, implementing the suitable hybrid algorithms for a given optimization problem is a considerably difficult, which in most cases, is time consuming. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom by Masrom, Suraya

    Published 2015
    “…However, in many cases, implementing the suitable hybrid algorithms for a given optimization problem is a considerably difficult, which in most cases, is time consuming. …”
    Get full text
    Get full text
    Book Section
  11. 11

    Parallel Implementation of Two Level Barotropic Models Applied to the Weather Prediction Problem by Bahri, Susila

    Published 2004
    “…To process the data collected from British Atmospheric Data Centre (BADC), the sequential programs in row and columnwise fashions are developed and implemented. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A genetic algorithm for solving single level lotsizing problems by Zenon, Nasaruddin, Ahmad, Ab. Rahman, Ali, Rosmah

    Published 2003
    “…In this paper a genetic algorithm for solving single level lot-sizing problems is proposed and the results of applying the algorithm toexample problems are discussed. …”
    Get full text
    Get full text
    Article
  13. 13

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Fuzzy expert system to evaluate programming question / Norfarhana Syamiza Amir Sham by Amir Sham, Norfarhana Syamiza

    Published 2017
    “…This system is used by lecturers that teach programming course. Data to implement the FES system is the type level of control structure in programming question paper that contributes to the level of the question. …”
    Get full text
    Get full text
    Thesis
  15. 15

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Professional and public accreditation as an assessment of agricultural educational program quality in Russia / Natalya A. Medvedeva, Nikolay G. Malkov and Marina L. Prozorova by A. Medvedeva, Natalya, G. Malkov, Nikolay, L. Prozorova, Marina

    Published 2021
    “…Professional and public accreditation of agricultural educational programs will allow for an external examination of the educational program implementation level and quality in accordance with approved professional standards and develop recommendations aimed at student training level improvement. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm by Chong, Kok Hen

    Published 2008
    “…ODCSD is a digital circuit structure design simulation program. Further more, a prototype hardware has been designed and constructed to test the success chromosome string, which called as GA based Logic Implementer (GALI). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item