Search Results - (( java applications cloud algorithm ) OR ( whale optimization sensor algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1
  2. 2

    Whale optimization algorithm strategies for higher interaction strength t-way testing by Ali Abdullah, Hassan, Salwani, Abdullah, Kamal Z., Zamli, Rozilawati, Razali

    Published 2022
    “…To ensure that WOA conquers premature convergence and avoids local optima for large search spaces (owing to high-order interaction), three variants of WOA have been developed, namely Structurally Modified Whale Optimization Algorithm (SWOA), Tolerance Whale Optimization Algorithm (TWOA), and Tolerance Structurally Modified Whale Optimization Algorithm (TSWOA). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Whale optimization algorithm based on tent chaotic map for feature selection in soft sensors by AlRijeb, Mothena Fakhri Shaker, Othman, Mohammad Lutfi, Ishak, Aris, Hassan, Mohd Khair, Albaker, Baraa Munqith

    Published 2025
    “…One of the powerful optimization algorithms that is used for feature selection is the Whale Optimization Algorithm (WOA), which is a nature-inspired metaheuristic optimization algorithm that mimics the social behavior of humpback whales. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Using the evolutionary mating algorithm for optimizing the user comfort and energy consumption in smart building by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2023
    “…EMA belongs to the evolutionary computation group of nature-inspired metaheuristic algorithms and offers a promising solution. A comparative analysis is conducted with other well-known algorithms such as Particle Swarm Optimization (PSO), Differential Evolution (DE), Ant Colony Optimization (ACO), Biogeography-Based Optimization (BBO), Teaching-Learning Based Optimization (TLBO), and Beluga Whale Optimization (BWO). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis