Search Results - (( evolution optimization learning algorithm ) OR ( java information security algorithm ))
Search alternatives:
- evolution optimization »
- optimization learning »
- learning algorithm »
- java information »
-
1
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…Hybrid genetic algorithms are the combination of learning algorithms(Back propagation), usually working as evaluation functions, and genetic algorithms. …”
Get full text
Get full text
Get full text
Article -
2
Differential evolution for neural networks learning enhancement
Published 2008“…To overcome this problem, Differential Evolution (DE) has been used to determine optimal value for ANN parameters such as learning rate and momentum rate and also for weight optimization. …”
Get full text
Get full text
Get full text
Thesis -
3
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…The two most famous techniques for data security are steganography and cryptography. Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…Therefore, SANAsms system ensures that information (SMS) interchange between sender and receiver is secured and protected because the messages containing delicate information are stored securely and remain undisclosed even when the device is accessed by an adversary. …”
Get full text
Get full text
Conference or Workshop Item -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
6
-
7
Broadening selection competitive constraint handling algorithm for faster convergence
Published 2020“…In this study, the BSCCH algorithm has been coupled with Differential Evolution algorithm as a proof of concept because it is found to be an efficient algorithm in the literature for constrained optimization problems. …”
Get full text
Get full text
Article -
8
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
9
Dual optimization approach in discrete Hopfield neural network
Published 2024“…Therefore, this research contributes to the improvement of the learning and retrieval phases by integrating the Hybrid Differential Evolution Algorithm and Swarm Mutation respectively. …”
Get full text
Get full text
Article -
10
Navigating challenges and opportunities of machine learning in hydrogen catalysis and production processes: Beyond algorithm development
Published 2025“…This review uniquely focuses on harnessing the synergy between ML and computational modeling (CM) or optimization tools, as well as integrating multiple ML techniques with CM, for the synthesis of diverse hydrogen evolution reaction (HER) catalysts and various hydrogen production processes (HPPs). …”
Review -
11
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The significance is to protect personal information and provide future robust security on mobile messaging application. …”
Get full text
Get full text
Student Project -
12
Using the evolutionary mating algorithm for optimizing deep learning parameters for battery state of charge estimation of electric vehicle
Published 2023“…This paper presents the application of a recent metaheuristic algorithm namely Evolutionary Mating Algorithm (EMA) for optimizing the Deep Learning (DL) parameters to estimate the state of charge (SOC) of a battery for an electric vehicle in the real environment. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Improved whale optimization algorithm for feature selection in Arabic sentiment analysis
Published 2019“…Whale Optimization Algorithm (WOA) is one of the recent metaheuristic optimization algorithm that mimics the whale hunting mechanism. …”
Get full text
Get full text
Article -
14
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Artificial neural network learning enhancement using Artificial Fish Swarm Algorithm
Published 2011“…Artificial Neural Network (ANN) is a new information processing system with large quantity of highly interconnected neurons or elements processing parallel to solve problems.Recently, evolutionary computation technique, Artificial Fish Swarm Algorithm (AFSA) is chosen to optimize global searching of ANN.In optimization process, each Artificial Fish (AF) represents a neural network with output of fitness value.The AFSA is used in this study to analyze its effectiveness in enhancing Multilayer Perceptron (MLP) learning compared to Particle Swarm Optimization (PSO) and Differential Evolution (DE) for classification problems.The comparative results indeed demonstrate that AFSA show its efficient, effective and stability in MLP learning.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A New Co-Evolution Binary Particle Swarm Optimization With Multiple Inertia Weight Strategy For Feature Selection
Published 2019“…Hence, a new co-evolution binary particle swarm optimization with a multiple inertia weight strategy (CBPSO-MIWS) is proposed in this work. …”
Get full text
Get full text
Get full text
Article -
17
Performances Of Metaheuristic Algorithms In Optimizing Tool Capacity Allocations
Published 2014“…In this research, the algorithms studied includes Genetic Algorithm, Particle Swarm Optimization Algorithm, Differential Evolution Algorithm, Harmony Search Algorithm, Teaching-LearningBased Optimization Algorithm and Black Hole Algorithm. …”
Get full text
Get full text
Thesis -
18
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
Published 2020“…To evaluate the PMT’s performance and adaptability, the PMT was applied to four contemporary metaheuristic algorithms, Differential Evolution, Particle Swarm Optimization, Simulated Annealing, and Whale Optimization Algorithm, to solve 15 well-known benchmark functions as well as 2 real world problems based on the welded beam design and pressure vessel design. …”
Get full text
Get full text
Thesis -
19
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
20
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…These randomly generated detectors suffer from not been able to adequately cover the non-self space, which diminishes the detection performance of the V-Detectors algorithm. This research therefore proposed CSDE-V-Detectors which entail the use of the hybridization of Cuckoo Search (CS) and Differential Evolution (DE) in optimizing the random detectors of the V-Detectors. …”
Get full text
Get full text
Get full text
Get full text
Thesis
