Search Results - (( adaptive a different evolution algorithm ) OR ( adaptive _ different encryption algorithm ))

Refine Results
  1. 1

    Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy by Al-Dabbagh, Rawaa Dawoud, Neri, Ferrante, Idris, Norisma, Baba, Mohd Sapiyan

    Published 2018
    “…A trend that has emerged recently is to make the algorithm parameters automatically adapt to different problems during optimization, thereby liberating the user from the tedious and time-consuming task of manual setting. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Developing a hybrid model for accurate short-term water demand prediction under extreme weather conditions: a case study in Melbourne, Australia by Zubaidi S.L., Kumar P., Al-Bugharbee H., Ahmed A.N., Ridha H.M., Mo K.H., El-Shafie A.

    Published 2024
    “…Hybrid model development included the optimization of ANN coefficients (its weights and biases) using adaptive guided differential evolution algorithm. Post-optimization ANN model was trained using eleven different leaning algorithms. …”
    Article
  4. 4
  5. 5
  6. 6
  7. 7

    Broadening selection competitive constraint handling algorithm for faster convergence by Shaikh, T.A., Hussain, S.S., Tanweer, M.R., Hashmani, M.A.

    Published 2020
    “…In this study, the BSCCH algorithm has been coupled with Differential Evolution algorithm as a proof of concept because it is found to be an efficient algorithm in the literature for constrained optimization problems. …”
    Get full text
    Get full text
    Article
  8. 8

    A comparative study for parameter selection in online auctions by Gan, Kim Soon

    Published 2009
    “…In this work, three different models of genetic algorithms are considered. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. There are two types of security for the new cryptosystem that we are concerned which are the security of Lucas function and its security against an adaptive chosen ciphertext attack. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Channel quality indicator for long term evolution system based on adaptive threshold feedback compression scheme by Abdulhasan, Muntadher Qasim

    Published 2014
    “…This thesis proposes an adaptive feedback algorithm that uses a threshold scheme to enhance the system throughput while maintaining low Block Error Rate (BLER), Bit Error Rate (BER), and overhead. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Evolution strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…Generally, CB uses a group of distributed wireless sensor nodes, which collectively transmit a common message with different proper weights to an intended location. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…VL-WIDE has accomplished a higher median value for the domination over state-of-the-art algorithms with a higher number of non- dominated solutions value than all other benchmarks. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem by Anniza, Hamdan, San Nah, Sze, Say Leng, Goh, Kang Leng, Chiew, Wei King, Tiong

    Published 2023
    “…The evolutionary algorithm has been extensively used to solve a range of combinatorial optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A comprehensive comparison of evolutionary optimization limited by number of evaluations against time constraints by Jia, Hui Ong, Teo, Jason Tze Wi

    Published 2016
    “…To find out the answer for this question, four well-known and most commonly-used algorithms are tested. Particle swarm optimization (PSO), Differential Evolution (DE), Genetic Algorithms (GA), and Covariance Matrix Adaptation Evolution Strategy (CMA-ES) are tested in three different setups of experiments. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Dynamic smart grid communication parameters based cognitive radio network by Haider H.T., Muhsen D.H., Shahadi H.I., See O.H., Elmenreich W.

    Published 2023
    “…The proposed system helps to drive optimal communication parameters to realize power saving, maximum throughput and minimum bit error rate communication modes. A differential evolution algorithm is used to select the optimal transmission parameters for given communication modes based on a fitness function that combines multiple objectives based on appropriate weights. …”
    Article
  18. 18

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Optimized adaptive neuro-fuzzy inference system using metaheuristic algorithms: Application of shield tunnelling ground surface settlement prediction by Liu, Xinni, Hussein, Sadaam Hadee, Kamarul Hawari, Ghazali, Tung, Tran Minh, Yaseen, Zaher Mundher

    Published 2021
    “…The predictive models were various nature-inspired frameworks, such as differential evolution (DE), particle swarm optimization (PSO), genetic algorithm (GA), and ant colony optimizer (ACO) to tune the adaptive neuro-fuzzy inference system (ANFIS). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Evoluation strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…Generally, CB uses a group of distributed wireless sensor nodes, which collectively transmit a common message with different proper weights to an intended location. …”
    Get full text
    Get full text
    Get full text
    Thesis