Search Results - (( adaptive _ difference encryption algorithm ) OR ( adaptive over different evolution algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1
  2. 2

    Evolution strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…In addition, inverse phase perturbation is introduced for the improved ES (IES) which further improved the convergence speed by 31.6 % over the C1BF approach. Adaptive-IES is proposed for time-varying channels and the results show that the Adaptive-IES has the ability to detect channel changes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Unlike the existing optimization algorithm, VL-WIDE features the capability of searching different lengths of solutions to cover the variable number of cloudlets for deployment. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. There are two types of security for the new cryptosystem that we are concerned which are the security of Lucas function and its security against an adaptive chosen ciphertext attack. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced by Ahmed-Abdulazeez, Mariam Ovayioza

    Published 2018
    “…The HHPO and the MC-HOD algorithms achieves significant enhancement compared to the conventional and other algorithms examined. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Performance evaluation of hybrid adaptive neuro-fuzzy inference system models for predicting monthly global solar radiation by Halabi, Laith M., Mekhilef, Saad, Hossain, Monowar

    Published 2018
    “…The performance evaluation over different statistical indicators showed high correlation for all developed modules. …”
    Get full text
    Get full text
    Article
  9. 9

    Evoluation strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…In addition, inverse phase perturbation is introduced for the improved ES (IES) which further improved the convergence speed by 31.6 % over the C1BF approach. Adaptive-JES is proposed for time-varying channels and the results show that the Adaptive-JES has the ability to detect channel changes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System by Chiadighikaobi, Ikenna Rene

    Published 2024
    “…An enhanced PRESENT encryption and an Elliptic-Curve Cryptography algorithm were adapted to achieve a lightweight authentication scheme, a necessity of the resource-constraint devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Performance analysis of hybrid renewable energy systems used for rural electrification in Malaysia / Laith Mahmoud Mohammad Halabi by Laith Mahmoud, Mohammad Halabi

    Published 2017
    “…Accordingly, the results of predicting monthly global solar radiation showed a very good agreement between the predicted and measured data sets besides it demonstrated the high prediction capability of the developed hybrid models using standalone Adaptive Neuro-Fuzzy Inference System (ANFIS) and hybrid ANFIS models which include ANFIS-PSO (Particle Swarm Optimization), ANFIS-GA (Genetic Algorithm), and ANFIS-DE (Differential Evolution). …”
    Get full text
    Get full text
    Thesis