Search Results - (( its location based algorithm ) OR ( its application ((bees algorithm) OR (new algorithm)) ))*
Search alternatives:
- its application »
- bees algorithm »
- new algorithm »
- its location »
-
1
Data clustering using the bees algorithm
Published 2007“…The main problem with this clustering method is its tendency to converge to local optima. The authors’ team have developed a new population based search algorithm called the Bees Algorithm that is capable of locating near optimal solutions efficiently. …”
Get full text
Get full text
Conference or Workshop Item -
2
Performance Enhancement Of Artificial Bee Colony Optimization Algorithm
Published 2013“…Artificial Bee Colony (ABC) algorithm is a recently proposed bio-inspired optimization algorithm, simulating foraging phenomenon of honeybees. …”
Get full text
Get full text
Thesis -
3
Acoustic emission partial discharge localization in oil based on artificial bee colony
Published 2025“…This study explores the application of an artificial bee colony (ABC) to locate partial discharge (PD) in a test tank based on acoustic emission (AE) approach. …”
Get full text
Get full text
Get full text
Article -
4
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
Get full text
Get full text
Thesis -
5
Improved tree routing protocol in zigbee networks
Published 2010“…ZigBee is an industrial standard for wireless ad hoc networks based on IEEE 802.15.4. …”
Get full text
Get full text
Thesis -
6
A coordinated design of PSSs and UPFC-based stabilizer using Genetic Algorithm
Published 2013Get full text
Conference or Workshop Item -
7
Application of genetic algorithm in optimization of unified power flow controller parameters and its location in the power system network
Published 2013“…The GA is applied to find the optimal location of the UPFC and to tune its control parameters under different operating conditions. …”
Get full text
Get full text
Article -
8
HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation
Published 2021“…Consequently, a new meta-heuristic based t -way strategy called Hybrid Artificial Bee Colony (HABCSm) strategy, based on merging the advantages of the Artificial Bee Colony (ABC) algorithm with the advantages of a Particle Swarm Optimization (PSO) algorithm is proposed in this paper. …”
Get full text
Get full text
Article -
9
HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation
Published 2021“…Consequently, a new meta-heuristic based t -way strategy called Hybrid Artificial Bee Colony (HABCSm) strategy, based on merging the advantages of the Artificial Bee Colony (ABC) algorithm with the advantages of a Particle Swarm Optimization (PSO) algorithm is proposed in this paper. …”
Get full text
Get full text
Article -
10
An enhanced distance vector-hop algorithm using new weighted location method for wireless sensor networks
Published 2020“…In the final phase, least squares are employed to address nonlinear equation, which will gain greater location errors. Aimed at addressing problems mentioned above, an enhanced DV-Hop algorithm based on weighted factor, along with new weighted least squares location technique, is proposed in this paper, and it is called WND-DV-Hop. …”
Get full text
Get full text
Get full text
Article -
11
Development Of Artificial Bee Colony (Abc) Variants And Memetic Optimization Algorithms
Published 2017“…One of BIAs, artificial bee colony (ABC) optimization algorithm, has shown excellent performance in many applications compared to other optimization algorithms. …”
Get full text
Get full text
Thesis -
12
-
13
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article -
15
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
16
Pengesanan nombor plat kenderaan menggunakan alkhwarizmi gugusan dan kelancaran jarak larian(GKJL)
Published 2009“…A new algorithm called Cluster Run Length Smoothing Algorithm (CRLSA) approach was applied to locate the license plate at the right position. …”
Get full text
Get full text
Get full text
Article -
17
Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau
Published 2020“…The advantages of AR-based FLP approach over the other approaches are the shorter time taken to build its model and its flexibility in the design modification. …”
Get full text
Get full text
Get full text
Thesis -
18
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
Get full text
Get full text
Thesis -
19
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…The proposed algorithm is simulated for simultaneous OPF-based conflicting objectives, respectively. …”
Get full text
Get full text
Thesis -
20
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis
