Search Results - (( mobile application bee algorithm ) OR ( _ application out algorithm ))

Refine Results
  1. 1

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Biologically inspired mobile agent-based sensor network (BIMAS) by Ponnusamy, V., Low, T.J., Amin, A.H.M.

    Published 2014
    “…The research outcome is a biologically inspired mobile agent-based system (BIMAS) that provides a novel self-healing (bee pollination analogy for energy efficiency) protocol, leading to a longer WSNs lifetime. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    ABC-PSO for vertical handover in heterogeneous wireless networks by Goudarzi, Shidrokh, Hassan, Wan Haslina, Anisi, Mohammad Hossein, Soleymani, Seyed Ahmad, Sookhak, Mehdi, Khan, Muhammad Khurram, Hassan Abdalla Hashim, Aisha, Zareei, Mahdi

    Published 2017
    “…Nevertheless, attributes of mobile devices need algorithms that are quick and effective in order to select best available network near real-time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Gps solution for active queue management using android platform by Liu, Yu Yao

    Published 2021
    “…Four tickets management applications, namely QueueBee, powerQ, WaveTec and QLess are reviewed to understand both strengths and weaknesses of existing application on current market. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…To do so, we have introduced a new sequential m-out-of-n algorithm with prediction ability which is known as enhanced m-out-of-n voter. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Optimal power flow using the Jaya algorithm by Warid, Warid, Hizam, Hashim, Mariun, Norman, Abdul Wahab, Noor Izzri

    Published 2016
    “…Statistical analysis is also carried out to check the reliability of the Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah by Ali, Sadollah

    Published 2013
    “…In this thesis, the applications of a number of well-known metaheuristic algorithms for solving engineering problems have been considered. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Implication of image processing algorithm in remote sensing and GIS applications by Pathan, Mubeena, Jusoff, Kamaruzaman, Mohd Sood, Alias, Razali, Yaakob, Qureshi, Barkatullah

    Published 2011
    “…This paper generally analyzed and branch out algorithms to perceive their limitations and delimitation. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20