Search Results - (( web application model algorithm ) OR ( its application ((use algorithm) OR (bees algorithm)) ))*
Search alternatives:
- application model »
- web application »
- model algorithm »
- its application »
- bees algorithm »
- use algorithm »
-
1
-
2
Optimal design of step – cone pulley problem using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Book Chapter -
3
-
4
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
5
Optimisation of Surface Roughness in 3D Printing Using the Bees Algorithm
Published 2025Get full text
Get full text
Get full text
Get full text
Book Chapter -
6
Protein Conformantional Search Using Bees Algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Bees algorithm for Forest transportation planning optimization in Malaysia
Published 2021“…Algorithm is widely used in various areas due to its ability to solve classes of problems. …”
Get full text
Get full text
Article -
8
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…The assistant will provide suitable house recommendation to a home buyer based on particular information house specification such as house price, locations neighbourhood and surrounding information. This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
Get full text
Get full text
Thesis -
9
Artificial Bee Colony Algorithm for Pairwise Test Generation
Published 2017“…PABC progresses as a means to achieve the effective use of the artificial bee colony algorithm for pairwise testing reduction.…”
Get full text
Get full text
Get full text
Article -
10
-
11
-
12
Optimising a waste management system using the Artificial Bee Colony (ABC) algorithm
Published 2025“…This study proposed the application of the Artificial Bee Colony (ABC) algorithm to address the Capacitated Vehicle Routing Problem (CVRP) in a real-world waste collection scenario. …”
Get full text
Get full text
Student Project -
13
-
14
Enhanced artificial bee colony-least squares support vector machines algorithm for time series prediction
Published 2014“…This study proposed a hybrid algorithm, based on Artificial Bee Colony (ABC) and LSSVM, that consists of three algorithms; ABC-LSSVM, lvABC-LSSVM and cmABC-LSSVM. …”
Get full text
Get full text
Get full text
Thesis -
15
Comparative analysis of spiral dynamic algorithm and artificial bee colony optimization for position control of flexible link manipulators
Published 2024“…Interestingly, the manipulator's behaviours using the spiral dynamics algorithm for PID controller tuning were superior to those using alternative methods. …”
Get full text
Get full text
Get full text
Article -
16
-
17
A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets
Published 2021“…This study proposed an enhanced algorithm called hellingerant-tree-miner (HATM) which is inspired by ant colony optimization (ACO) metaheuristic for imbalanced learning using decision tree classification algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Acoustic emission partial discharge localization in oil based on artificial bee colony
Published 2025“…This study explores the application of an artificial bee colony (ABC) to locate partial discharge (PD) in a test tank based on acoustic emission (AE) approach. …”
Get full text
Get full text
Get full text
Article -
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article
