Search Results - (( evolution optimization mining algorithm ) OR ( using function new algorithm ))
Search alternatives:
- evolution optimization »
- mining algorithm »
- using function »
- new algorithm »
- function new »
-
1
Y-type Random 2-satisfiability In Discrete Hopfield Neural Network
Published 2024“…The proposed algorithm and mutation mechanism showed optimal performances as compared to the existing algorithms. …”
Get full text
Get full text
Thesis -
2
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
Get full text
Get full text
Get full text
Thesis -
3
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…A new self-adaptive hybrid algorithm (CSCMAES) is introduced for optimization. …”
Get full text
Get full text
Thesis -
4
Classification with degree of importance of attributes for stock market data mining
Published 2004“…The experimental results show that predictive FDT algorithm can generate a relatively optimal tree without much computation effort (comprehensibility), and WFPRs have a better predictive accuracy of stock market time series data. …”
Get full text
Get full text
Article -
5
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
6
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
7
An efficient computation technique for cryptosystems based on Lucas functions
Published 2008“…We have found that the binary sequence used in a new algorithm is shorter than a special sequence used in an existing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
8
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…Next, the Dynamic Demand Replacement Algorithm (DDRA) algorithm is used to place in-demand functions near the edge nodes periodically, while the proposed task scheduling algorithm - Maximum Revenue Bid (MRB) is used to give priority to tasks to maximise revenue near the edge. …”
Get full text
Get full text
Get full text
Article -
9
New heuristic function in ant colony system for the travelling salesman problem
Published 2012“…However, one part of the algorithm, called heuristic function, is not updated at any time throughout the process to reflect the new information discovered by the ants.This paper proposes an Enhanced Ant Colony System algorithm for solving the Travelling Salesman Problem.The enhanced algorithm is able to generate shorter tours within reasonable times by using accumulated values from pheromones and heuristics.The proposed enhanced ACS algorithm integrates a new heuristic function that can reflect the new information discovered by the ants. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…I used different types of optimization algorithms to improve the performance of the neural networks. …”
Get full text
Get full text
Thesis -
11
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Published 2004“…The principle benefit of using this new approach over the transform from Rijndael block cipher is speed. …”
Get full text
Get full text
Thesis -
12
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Article -
13
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…New technique shows a smaller computation time compared to the existing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
14
A new computation algorithm for a cryptosystem based on Lucas Functions
Published 2008“…The experimental results of existing and new algorithm are included.…”
Get full text
Article -
15
New heuristic function in ant colony system for job scheduling in grid computing
Published 2012Get full text
Get full text
Conference or Workshop Item -
16
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Reducing the calculation time of the algorithm, in sequential and parallel platforms, using the doubling-rule technique combined with a new scheme led to a strong improvement of the LUC algorithm speed. …”
Get full text
Get full text
Thesis -
17
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations
Published 2009“…The principle benefit of using this new approach over the transform from Rijndael block cipher is speed. …”
Get full text
Get full text
Article -
18
Assessing the symbiotic organism search variants using standard benchmark functions
Published 2019“…In this paper, we present a new version of SOS by looping the current algorithm rather than doing it one after the other. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Comparison between Genetic Algorithm and Prey-Predator Algorithm.
“…The use of metaheuristic algorithms to different problems becomes very common after the introduction of genetic algorithm in 1975. …”
Get full text
Monograph -
20
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
Get full text
Get full text
Get full text
Article
