Search Results - ((((control algorithm) OR (encryption algorithm))) OR (evolutionary algorithm))
Search alternatives:
- evolutionary »
-
1
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Thesis -
2
-
3
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Thesis -
4
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Student Project -
5
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
6
A novell approach on evolutionary dynamics analysis - A progress report
Published 2017“…We pro-pose a novel approach non how to analyze and control dynamic of evolutionary algorithm and also discuss possibility on strange dynamics analysis that is a part of dynamic of evolutionary algorithms. …”
Get full text
Get full text
Article -
7
A novel approach on evolutionary dynamics analysis � A progress report
Published 2018“…We propose a novel approach on how to analyze and control dynamic of the evolutionary algorithm and also discuss the possibility of strange dynamics analysis that can be a part of dynamic of evolutionary algorithms. …”
Get full text
Get full text
Article -
8
A novel approach on evolutionary dynamics analysis � A progress report
Published 2018“…We propose a novel approach on how to analyze and control dynamic of the evolutionary algorithm and also discuss the possibility of strange dynamics analysis that can be a part of dynamic of evolutionary algorithms. …”
Get full text
Get full text
Article -
9
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…Under the control of the dynamic encryption step algorithm, it effectively destroys the correlation between the source image’s pixels. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
10
Intelligent Evolutionary Controller for Flexible Robotic Arm
Published 2020“…The controller algorithm has been formulated for trajectory planning control and vibration cancelation utilizing intelligent evolutionary algorithms such as Particle Swarm Algorithm and Artificial Bees Colony. …”
Get full text
Get full text
Get full text
Article -
11
Implementation of PID based controller tuned by Evolutionary Algorithm for Double Link Flexible Robotic Manipulator
Published 2018“…The system was modeled using multi-layer perceptron neural network structure based on Nonlinear Autoregressive Exogenous (NARX) model. The hybrid controllers are incorporated with optimization algorithm that is ABC and PSO to find out the parameters of the PID controllers. …”
Get full text
Get full text
Get full text
Proceeding -
12
A comparative study of evolutionary algorithms and adapting control parameters for estimating the parameters of a single-diode photovoltaic module's model
Published 2023“…Algorithms; Diodes; Errors; Iterative methods; Least squares approximations; Mean square error; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Coefficient of determination; Differential Evolution; Electromagnetism-like algorithm; Hybrid evolutionary algorithm; Photovoltaic; Photovoltaic modules; Root mean square errors; Single-diode models; Evolutionary algorithms; algorithm; comparative study; electromagnetic method; estimation method; experimental design; numerical method; parameterization; performance assessment; photovoltaic system…”
Article -
13
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007“…One type of encryption is 'one-way hashing function' which consists of several algorithms such as Message Digests (MD), Secure Hash Algorithm (SHA) and RIPEMD etc. …”
Get full text
Get full text
Research Reports -
14
CHAOS BASED BLOCK ENCRYPTOR
Published 2008“…The coding of encryption and decryption algorithms is created using C language. …”
Get full text
Get full text
Final Year Project -
15
-
16
Barnacles mating optimizer: an evolutionary algorithm for solving optimization
Published 2018“…Comparisons with other evolutionary algorithms also will be presented in this paper.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
An improved chaotic image encryption algorithm
Published 2018“…Chaotic-based image encryption algorithms are countless in number. Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
A New Hybrid Image Encryption Technique Using Lorenz Chaotic System and Simulated Kalman Filter (SKF) Algorithm
Published 2022“…A new hybrid technique, Lorenz chaotic system and an optimization algorithm, Simulated Kalman Filter (SKF) had been proposed to solve image encryption problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Evolutionary multi-objective optimization of autonomous mobile robots in neural-based cognition for behavioural robustness
Published 2009“…It explains the comparison performances among the elitism without archive and elitism with archive used in the evolutionary multi-objective optimization (EMO) algorithm in an evolutionary robotics study. …”
Get full text
Get full text
Get full text
Chapter In Book -
20
Optimal charging strategy for plug-in hybrid electric vehicle using evolutionary algorithm
Published 2016“…An optimal charging strategy for plug-in hybrid electric vehicle (PHEV) is proposed and developed by using evolutionary algorithm to obtain the most suitable charging condition for each PHEV charging. …”
Get full text
Get full text
Undergraduates Project Papers
