Search Results - (( _ application bee algorithm ) OR ( some applications ((need algorithm) OR (new algorithm)) ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Artificial Bee Colony Algorithm for Pairwise Test Generation by Alazzawi, Ammar K., Homaid, Ameen A. Ba, Alomoush, Alaa A., Alsewari, Abdulrahman A.

    Published 2017
    “…PABC progresses as a means to achieve the effective use of the artificial bee colony algorithm for pairwise testing reduction.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Hydroclimatic data prediction using a new ensemble group method of data handling coupled with artificial bee colony algorithm by Basri Badyalina, Nurkhairany Amyra Mokhtar, Nur Amalina Mat Jan, Muhammad Fadhil Marsani, Mohamad Faizal Ramli, Muhammad Majid, Fatin Farazh Ya'acob

    Published 2022
    “…It is rare to find a hydrological application using the group method of data handling (GMDH) model, artificial bee colony (ABC) algorithm, and ensemble technique, precisely predicting ungauged sites. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Pairwise Test Suite Generation Based on Hybrid Artificial Bee Colony Algorithm by Alazzawi, A.K., Rais, H.M., Basri, S., Alsariera, Y.A.

    Published 2020
    “…Complementing to the earlier researches, this paper proposes a new pairwise test suite generation called Pairwise Hybrid Artificial Bee Colony (PhABC) strategy based on hybridize of an Artificial Bee Colony (ABC) algorithm with a Particle Swarm Optimization (PSO) algorithm. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    HISEC: a new lightweight block cipher algorithm by Alshaikhli, Imad Fakhri Taha, Mahmood Al Dabbagh, Sufyan Salim, Alahmad, Mohammad

    Published 2014
    “…Lightweight block cipher algorithms are vital for constrained environment. There are many applications need secured lightweight block cipher algorithm like credit card, E-passport and etc. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179) by Ahmad, Nazihah, Ibrahim, Haslinda

    Published 2021
    “…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14
  15. 15

    Iterative methods for solving split common fixed point problems in Hilbert spaces by Mohammed, Lawan Bulama

    Published 2016
    “…Our interest here is to apply these mappings to propose some algorithms for solving split common fixed point problems and its variant forms, in the end, we prove the convergence results of these algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm by ,, Dwi Pebrianti, Ann Ayop azmi, Nurnajmi Qasrina, Bayuaji, Luhur, Suarin, Nur Aisyah Syafinaz, ,, Muhammad Syafrullah

    Published 2022
    “…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
    Get full text
    Get full text
    Book Chapter
  17. 17
  18. 18
  19. 19
  20. 20

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis