Search Results - (( java application system algorithm ) OR ( data estimation bees algorithm ))
Search alternatives:
- java application »
- system algorithm »
- data estimation »
- bees algorithm »
-
1
Artificial Bee Colony algorithm in estimating kinetic parameters for yeast fermentation pathway
Published 2023“…Most of the estimated kinetic parameter values obtained from the proposed algorithm are the closest to the experimental data.…”
Get full text
Get full text
Get full text
Article -
2
Parameter estimation of essential amino acids in Arabidopsis thaliana using hybrid of bees algorithm and harmony search
Published 2019“…Global optimization methods can be applied by minimizing the distance between experimental data and predicted models. This paper proposes the Hybrid of Bees Algorithm and Harmony Search (BAHS) to estimate the kinetics parameters of essential amino acid production in the aspartate metabolism for Arabidopsis thaliana. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
3
Acoustic emission partial discharge localization in oil based on artificial bee colony
Published 2025“…Therefore, the ABC was proposed to estimate the PD location through a colony of 120 bees, evenly divided into 60 employed and 60 onlooker bees. …”
Get full text
Get full text
Get full text
Article -
4
Optimising a waste management system using the Artificial Bee Colony (ABC) algorithm
Published 2025“…Future work may focus on integrating real-time data, adjusting algorithm parameters and hybridizing ABC algorithm with other metaheuristics to further improve performance.…”
Get full text
Get full text
Student Project -
5
Hydroclimatic data prediction using a new ensemble group method of data handling coupled with artificial bee colony algorithm
Published 2022“…It is rare to find a hydrological application using the group method of data handling (GMDH) model, artificial bee colony (ABC) algorithm, and ensemble technique, precisely predicting ungauged sites. …”
Get full text
Get full text
Get full text
Article -
6
-
7
The development of parameter estimation method for Chinese hamster ovary model using black widow optimization algorithm
Published 2020“…It will help the researcher get the fitted graph model, correct data, and estimate the value based on the data’s behaviour. …”
Get full text
Get full text
Get full text
Article -
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
-
10
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
12
Improving the modeling capacity of Volterra model using evolutionary computing methods based on Kalman Smoother adaptive filter
Published 2015“…The first step is combining the forward and backward estimator in the original Volterra model; the second step is reformulating the Volterra model into a state-space model so that the Kalman Smoother (KS) adaptive filter can be used to estimate the kernel coefficients; the third step is optimization of KS parameters using evolutionary computing algorithms such as particle swarm optimization (PSO), genetic algorithm (GA) and artificial bee colony (ABC). …”
Get full text
Get full text
Article -
13
SLOW DRIFT MOTIONS IDENTIFICATION OF FLOATING STRUCTURES USING TIME-VARYING INPUT -OUTPUT MODELS
Published 2015“…The first step is presenting the backward estimator and combined forward-backward estimator instead of the only forward estimator in the original input-output models; the second step is reformulating the input-output models into a state-space model so that the Kalman Smoother (KS) adaptive filter can be used to estimate the model coefficients; the third step is optimization of KS parameters using evolutionary computing algorithms such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA) and Artificial Bee Colony (ABC) to form the PSO-KS, GA-KS and ABC-KS as estimation methods.…”
Get full text
Get full text
Thesis -
14
-
15
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
-
17
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
18
Multifunctional optimized group method data handling for software effort estimation
Published 2022“…Group Method of Data Handling (GMDH) algorithms have been widely used for modelling and identifying complex systems and potentially applied in software effort estimation. …”
Get full text
Get full text
Thesis -
19
Improving the modeling capacity of Volterra model using evolutionary computing methods based on Kalman smoother adaptive filter
Published 2015“…The first step is combining the forward and backward estimator in the original Volterra model; the second step is reformulating the Volterra model into a state-space model so that the Kalman Smoother (KS) adaptive filter can be used to estimate the kernel coefficients; the third step is optimization of KS parameters using evolutionary computing algorithms such as particle swarm optimization (PSO), genetic algorithm (GA) and artificial bee colony (ABC). …”
Get full text
Get full text
Article -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
