Search Results - (( _ (constructive OR constructing) bees algorithm ) OR ( leave application server algorithm ))
Search alternatives:
- application server »
- leave application »
- server algorithm »
- bees algorithm »
-
1
Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance
Published 2023“…Cryptography; Bee Algorithm; Bee Waggle Dance; Box construction; Power functions; Substitution boxes; Heuristic methods…”
Article -
2
Adaptive filtering of EEG/ERP through bounded range artificial Bee Colony (BR-ABC) algorithm
Published 2014“…In this paper, the Artificial Bee Colony (ABC) algorithm is applied to construct Adaptive Noise Canceller (ANC) for electroencephalogram (EEG)/Event Related Potential (ERP) filtering with modified range selection, described as Bounded Range ABC (BR-ABC). …”
Get full text
Get full text
Article -
3
-
4
Acoustic emission partial discharge localization in oil based on artificial bee colony
Published 2025“…The employed bees explored the bounded search space, and onlooker bees refined PD locations found by the employed bees through local search. …”
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
Delay and cost overrun of palm oil refinery construction projects: Artificial neural network (ann) model
Published 2021“…A series of 39 questions were developed from the questionnaire survey causing delays and cost overruns during construction of palm oil refinery projects. Artificial Bee Colony (ABC) algorithm was used to develop the prediction model for palm oil construction projects. …”
Get full text
Get full text
Article -
8
Artificial Bee Colony-based satellite image contrast and brightness enhancement technique using DWT-SVD
Published 2014“…The proposed technique is based on the Artificial Bee Colony (ABC) algorithm using Discrete Wavelet Transform and Singular Value Decomposition (DWT-SVD). …”
Get full text
Get full text
Article -
9
-
10
Sediment load forecasting from a biomimetic optimization perspective: Firefly and Artificial Bee Colony algorithms empowered neural network modeling in �oruh River
Published 2025“…This study combined models such as the artificial neural network (ANN) algorithm with the Firefly algorithm (FA) and Artificial Bee Colony (ABC) optimization techniques for the estimation of monthly SL values in the �oruh River in Northeastern Turkey. …”
Article -
11
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
12
-
13
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
14
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The contributions of this study straddle research perspectives of enhancing Regression Testing with Particle Swarm-Artificial Bee Colony Algorithm, and practical perspectives by providing software testing practitioners the TCP framework that can facilitate and accelerate the production of high-quality software products by revealing faults early and reducing time, cost, and human efforts through automation.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Bee colony optimised mass rapid transit routing prototype
Published 2017Get full text
Get full text
Article -
16
Gps solution for active queue management using android platform
Published 2021“…Since queueing in different locations is considered as a optimisation problem, several algorithms are reviewed to tackle the problem, such as brute force method, nearest neighbour algorithm, and branch and bound algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…However, in BLE 4.2 environment, encryption algorithms are only applied between BLE devices and gateway thus leaving the network to be vulnerable on the public side of the BLE network which is between the gateway and the server. …”
Get full text
Get full text
Thesis -
18
Authenticated collaborative key agreement for dynamic peer groups
Published 2009Get full text
Working Paper -
19
A neural network modal decomposition mechanism in predicting network traffic
Published 2023“…It embeds a new proposed Scalable Artificial Bee Colony (SABC) algorithm, Phase Space Reconstruction, Variational Mode Decomposition (VMD) and an integrated Extreme Learning Machine (ELM). …”
Get full text
Get full text
Get full text
Thesis -
20
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…The database server decrypts the legal queries before effecting any changes. …”
Get full text
Get full text
Conference or Workshop Item
