Search Results - (( evolution optimization bees algorithm ) OR ( based encryption based algorithm ))

Refine Results
  1. 1

    Coil Optimization using Metaheuristic Techniques for Wireless Charging of Electric Vehicles - A Comparative Analysis. by Imtiaz T., Elsanabary A., Mekhilef S., Mubin M.B., Soon T.K., Aziz N.F.A.

    Published 2024
    “…Differential Evolution (DE), Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) optimization algorithms are used to obtain the lengths of all the turns of the transmitter coil. …”
    Conference Paper
  2. 2

    Application of swarm intelligence optimization on bio-process problems / Mohamad Zihin Mohd Zain by Mohamad Zihin , Mohd Zain

    Published 2018
    “…An improved version of Differential Evolution (DE) namely Backtracking Search Algorithm (BSA) is applied to several fed batch fermentation problems and its performance is compared with recent emerging metaheuristics such as Artificial Algae Algorithm (AAA), Artificial Bee Colony (ABC), Covariance Matrix Adaptation Evolution Strategy (CMAES) and DE. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…The purpose of this project is to implement FPGA Base Encryption Chip using DES algorithm. Throughout the project, the suitability of the implementation DES algorithm in FPGA will be investigated. …”
    Get full text
    Get full text
    Monograph
  4. 4

    Broadening selection competitive constraint handling algorithm for faster convergence by Shaikh, T.A., Hussain, S.S., Tanweer, M.R., Hashmani, M.A.

    Published 2020
    “…In this study, the BSCCH algorithm has been coupled with Differential Evolution algorithm as a proof of concept because it is found to be an efficient algorithm in the literature for constrained optimization problems. …”
    Get full text
    Get full text
    Article
  5. 5

    On the Computational Cost of Cocks’ Identity Based Encryption by Moo, Gabriel Ka Lin, Arif Mandangan, Rozaimi Zakaria

    Published 2018
    “…Unfortunately, lack of efficiency becomes a major drawback of the Cocks’ Identity Based Encryption. The algorithms in Cocks’ Identity Based Encryption consists of four stages: Setup, Extract, Encrypt and Decrypt. …”
    Get full text
    Get full text
    Article
  6. 6

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A new image encryption algorithm based on single S-box and dynamic encryption step by Wang, Ji Jun, Tan, Soo Fun

    Published 2021
    “…Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Experiment
  9. 9

    Comparative analysis of spiral dynamic algorithm and artificial bee colony optimization for position control of flexible link manipulators by Nor Maniha, Abdul Ghani, Nizaruddin, M. Nasir, Azrul Azim, Abdullah Hashim

    Published 2024
    “…This study aims to evaluate the effectiveness of two optimization algorithms, artificial bee colony (ABC) and spiral dynamic algorithm (SDA), in controlling the position of a flexible-link manipulator. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    An application of grey wolf optimizer for commodity price forecasting by Mustaffa, Zuriani, Sulaiman, Mohd Herwan, Yusof, Yuhanis

    Published 2015
    “…Over the recent decades, there are many nature inspired optimization algorithms have been introduced.In this study, a newly algorithm namely Grey Wolf Optimizer (GWO) is employed for gasoline price forecasting.The performance of GWO is compared against the results produced by Artificial Bee Colony (ABC) algorithm and Differential Evolution (DE) algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhanced chaotic image encryption algorithm based on Baker's map by Salleh, Mazleena, Ibrahim, Subariah, lsnin, Fauz

    Published 2003
    “…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
    Get full text
    Get full text
    Article
  14. 14

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An Application of Grey Wolf Optimizer for Commodity Price Forecasting by Zuriani, Mustaffa, M. H., Sulaiman, Yuhani, Yusof

    Published 2015
    “…The performance of GWO is compared against the results produced by Artificial Bee Colony (ABC) algorithm and Differential Evolution (DE) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A novel image encryption using an integration technique of blocks rotation based on the Magic cube and the AES Algorithm by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2012
    “…In this paper proposes an encryption algorithm for a new image protection scheme based on the rotation of the faces of a Magic Cube. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Optimization of fed-batch fermentation processes using the Backtracking Search Algorithm by Mohd Zain, Mohamad Zihin, Kanesan, Jeevan, Kendall, Graham, Chuah, Joon Huang

    Published 2018
    “…However, the complexity of these processes requires an expert system that involves swarm intelligence-based metaheuristics such as Artificial Algae Algorithm (AAA), Artificial Bee Colony (ABC), Covariance Matrix Adaptation Evolution Strategy (CMAES) and Differential Evolution (DE) for simulation and optimization of the feeding trajectories. …”
    Get full text
    Get full text
    Article
  18. 18

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan by Mohd Amdan, Muhammad Awwab

    Published 2014
    “…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
    Get full text
    Get full text
    Thesis