Search Results - (( adaptive two different evolution algorithm ) OR ( adaptive a different encryption algorithm ))
Search alternatives:
- different encryption »
- different evolution »
- evolution algorithm »
- two different »
- adaptive two »
- a different »
- adaptive a »
-
1
Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy
Published 2018“…DE is very sensitive to its parameter settings and mutation strategy; thus, this study aims to investigate these settings with the diverse versions of adaptive DE algorithms. This study has two main objectives: (1) to present an extension for the original taxonomy of evolutionary algorithms (EAs) parameter settings that has been overlooked by prior research and therefore minimize any confusion that might arise from the former taxonomy and (2) to investigate the various algorithmic design schemes that have been used in the different variants of adaptive DE and convey them in a new classification style. …”
Get full text
Get full text
Article -
2
Developing a hybrid model for accurate short-term water demand prediction under extreme weather conditions: a case study in Melbourne, Australia
Published 2024“…Hybrid model development included the optimization of ANN coefficients (its weights and biases) using adaptive guided differential evolution algorithm. Post-optimization ANN model was trained using eleven different leaning algorithms. …”
Article -
3
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…The second taxonomy is a new taxonomy proposed to classify the adaptive DE algorithms in particular into two categories (DE with adaptive parameters and DE with adaptive parameters and strategies) considering the adaptive components used in this algorithm. …”
Get full text
Get full text
Thesis -
4
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
5
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
6
-
7
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009“…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Broadening selection competitive constraint handling algorithm for faster convergence
Published 2020“…The median convergence traces have been compared with two different algorithms based on differential evolution, i:e: Ensemble of Constraint Handling Techniques (ECHT) and Stochastic Ranking Differential Evolution (SRDE). …”
Get full text
Get full text
Article -
9
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Channel quality indicator for long term evolution system based on adaptive threshold feedback compression scheme
Published 2014“…The percentage difference is 2.1%,compared with the full feedback method, with only 0.5% degradation. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
-
14
Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem
Published 2023“…The adaptability of evolutionary algorithm mechanisms provides diverse approaches to handle combinatorial optimization challenges. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
16
-
17
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Optimized adaptive neuro-fuzzy inference system using metaheuristic algorithms: Application of shield tunnelling ground surface settlement prediction
Published 2021“…The predictive models were various nature-inspired frameworks, such as differential evolution (DE), particle swarm optimization (PSO), genetic algorithm (GA), and ant colony optimizer (ACO) to tune the adaptive neuro-fuzzy inference system (ANFIS). …”
Get full text
Get full text
Get full text
Article -
20
