Search Results - (( box simulation optimization algorithm ) OR ( java application bee algorithm ))
Search alternatives:
- java application »
- application bee »
- box simulation »
- bee algorithm »
-
1
Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map
Published 2018“…This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4 ≤ n ≤ 8) based on a recent optimization algorithm known as sine-cosine algorithm (SCA). …”
Get full text
Get full text
Get full text
Article -
2
Fast Transient Simulations From S-Parameters With Improved Reference Impedance
Published 2015“…Subsequently, the S-parameter convolution can be further improved by optimizing the reference system of the model. An improvement by 64% and 29.5% of IFFT point usage numbers with Black Box 1 and Black Box 2. …”
Get full text
Get full text
Thesis -
3
OPTIMIZATION OFADVANCEDENCRYPTION STANDARD (AES) IN FPGA IMPLEMENTATION USING S-BOX INTEGRATION
Published 2004“…The optimization methodology in this project was achieved using S-Box integration. …”
Get full text
Get full text
Final Year Project -
4
Neural Network – A Black Box Model
Published 2024“…A variety of metaheuristic algorithms have been used to train ANN, including Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Simulated Annealing (SA), Ant Colony Optimization (ACO), Tabu Search (TS), and Harmony Search (HS). …”
Get full text
Get full text
Get full text
Book Chapter -
5
Energy cost optimization in high speed hard turning using simulated annealing algorithm
Published 2015“…Regression models have been developed by using Box-Behnken design as a design of experiment. Then, the Simulated Annealing Algorithm (SAA) has been used to optimize the cutting parameters. …”
Get full text
Get full text
Get full text
Article -
6
Box-jenkins and genetic algorithm hybrid model for electricity forecasting system
Published 2005“…In this thesis, an approach that combines the Box-Jenkins methodology for SARIMA model and Genetic Algorithm (GA) will been introduced as a new approach in making a forecast. …”
Get full text
Get full text
Thesis -
7
Automatic generation of Swarm Robotic behaviors using multi-objective evolution
Published 2009Get full text
Working Paper -
8
Quantum-Behaved Lightning Search Algorithm to Improve Indirect Field-Oriented Fuzzy-PI Control for im Drive
Published 2023Conference Paper -
9
Modification to queueing system M/M/1 with Blum-Blum-Shub generator
Published 2022“…In this paper, the researchers modified a type of queueing model simulation which is called ‘M/M/1’ by using a part of Blum-Blum-Shub algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
10
Optimized fuzzy logic sliding mode control with proportional-integral-derivative for an electrohydraulic actuator system
Published 2023“…Due to the difficulty of concurrent hybrid design, the PSO algorithm was employed to determine the optimal control variables value. …”
Get full text
Get full text
Get full text
Thesis -
11
Parallel CFD Simulations of Multiphase Systems: Jet into a Cylindrical Bath and Rotary Drum on a Rectangular Bath.
Published 2001“…For commercial CFD packages, in many cases the solution algorithms are black boxes, even though parallel computing helps in many cases to overcome the limitations, as shown here. …”
Get full text
Get full text
Article -
12
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Specifically, the paper utilized the YOLOv5s architecture coupled with k-means algorithm to perform anchor box optimization under different illumination levels. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
Get full text
Get full text
Final Year Project -
14
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
Get full text
Conference or Workshop Item -
15
Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm
Published 2025“…These methods present an effective alternative that treats plants as black-box systems without requiring explicit models. The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
Get full text
Get full text
Get full text
Article -
16
Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm
Published 2025“…These methods present an effective alternative that treats plants as black-box systems without requiring explicit models. The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Rainfall time series modeling for a mountainous region in West Iran
Published 2010“…Simulation results for the independent testing data series showed that the model can perform well in simulating one year monthly rainfall in advance .The SARIMA models were built using the same set of data as for the ANN. …”
Get full text
Get full text
Thesis -
19
Chemometric approaches in the evaluation of trace metals in commercially raised tilapia and preliminary health risk assessment of its consumption / Low Kah Hin
Published 2012“…For safety evaluation, the metal concentrations in the edible muscles were compared with the established legal limits and reasonable maximum exposures were simulated using the Monte Carlo algorithm.…”
Get full text
Get full text
Thesis -
20
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…These designed sub-modules namely substitution box, TBOX and tweak value computation, were optimized in terms of area being utilized by FPGA. …”
Get full text
Get full text
Thesis
