Search Results - (( adaptive any difference evolution algorithm ) OR ( adaptive a different encryption algorithm ))
Search alternatives:
- difference evolution »
- different encryption »
- evolution algorithm »
- any difference »
- adaptive any »
- a different »
- adaptive a »
-
1
Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy
Published 2018“…The proposed design framework provides readers with the main steps required to integrate any proposed meta-algorithm into parameter and/or strategy adaptation schemes.…”
Get full text
Get full text
Article -
2
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…The adaptive repository mechanism is a general scheme and can be embedded with high flexibility into any population-based evolutionary algorithm. …”
Get full text
Get full text
Thesis -
3
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
4
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009“…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
Published 2024“…An enhanced PRESENT encryption and an Elliptic-Curve Cryptography algorithm were adapted to achieve a lightweight authentication scheme, a necessity of the resource-constraint devices. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Techno-economic evaluation of off-grid hybrid renewable energy system for rural resort electrification in Malaysia / Monowar Hossain
Published 2017“…For these purposes, the standalone ANFIS, ANFIS-PSO (particle swarm optimization),ANFIS-GA (genetic algorithm) and ANFIS-DE (differential evolution) prediction algorithms have been developed in MATLAB platform. …”
Get full text
Get full text
Thesis
