Search Results - (( java application customization algorithm ) OR ( waste collection within algorithm ))
Search alternatives:
- customization algorithm »
- collection within »
- java application »
- waste collection »
- within algorithm »
-
1
Optimising a waste management system using the Artificial Bee Colony (ABC) algorithm
Published 2025“…This study proposed the application of the Artificial Bee Colony (ABC) algorithm to address the Capacitated Vehicle Routing Problem (CVRP) in a real-world waste collection scenario. …”
Get full text
Get full text
Student Project -
2
Metaheuristics for the waste collection vehicle routing problem with time windows
Published 2010“…In this problem there is a set of customers which waste is collected by vehicles.Vehicles can visit waste disposal facilities during their working day to empty collected waste and hence continue to collect from customers.The vehicles start and end their routes at a single depot empty.We take into consideration time windows associated with customers, disposal facilities and the depot.Here, we also have a driver rest period.The problem is solved using a number of metaheuristic algorithms namely tabu search (TS) and variable neighbourhood search (VNS).More over, we also present a combined metaheuristic algorithm based on variable neighbourhood tabu search (VNTS).Where the variable neighbourhood is searched via tabu search.Computational experiments on ten publicly available waste collection benchmark problems involving up to 2092 customers and 19 waste disposal facilities indicates that the proposed algorithms are able to find better quality solutions than previous work presented in literature within reasonable computation times.…”
Get full text
Get full text
Conference or Workshop Item -
3
Nearest greedy for solving the waste collection vehicle routing problem: A case study
Published 2017“…This paper presents a real case study pertaining to an issue related to waste collection in the northern part of Malaysia by using a constructive heuristic algorithm known as the Nearest Greedy (NG) technique. …”
Get full text
Get full text
Article -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
5
Applying machine learning and particle swarm optimization for predictive modeling and cost optimization in construction project management
Published 2024“…The Voting regression, which leverages the collective predictive power of multiple models, exhibits superior performance in comparison to individual algorithms. …”
Get full text
Get full text
Article -
6
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Applications of IoT and Artificial Intelligence in Water Quality Monitoring and Prediction: A Review
Published 2023Conference Paper -
8
An Implementation Framework Overview of Non-Intrusive Load Monitoring
Published 2024journal::journal article
