Search Results - (( java implementation level algorithm ) OR ( pattern evolution optimization algorithms ))
Search alternatives:
- optimization algorithms »
- evolution optimization »
- implementation level »
- java implementation »
- pattern evolution »
- level algorithm »
-
1
Optimal HE-PWM inverter switching patterns using differential evolution algorithm
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
3
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…The algorithm is based on the idea of the optimization problem in which resource allocation problem is formulated as an optimization problem. …”
Get full text
Get full text
Thesis -
5
A novel Master–Slave optimization algorithm for generating an optimal release policy in case of reservoir operation
Published 2019“…First, three different optimization algorithms, namely particle swarm optimization, differential evolution, and whale optimization algorithm, have been applied. …”
Get full text
Get full text
Article -
6
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
7
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…The biologists frequently demand for optimal comparison result so that the perfect structure of living beings evolution can be constructed. …”
Get full text
Get full text
Get full text
Article -
8
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
9
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
10
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Multi-area economic dispatch by using differential evolution immunized ant colony optimization (DEIANT)
Published 2023“…Each region has a specific cost and load pattern. Tie-lines are used as connectors to enable power switching between regions. 31-Bus test system tested using an algorithm known as Differential Evolution Immunized Ant Colony Optimization (DEIANT) with different case studies with several trials taken to assess the consistency of results. …”
Article -
12
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
13
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
14
Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals
Published 2020“…The third method is the hybridization of BPSO and Binary Differential Evolution, namely Binary Particle Swarm Optimization Differential Evolution (BPSODE). …”
Get full text
Get full text
Get full text
Thesis -
15
Reservoir system modelling using nondominated sorting genetic algorithm in the framework of climate change
Published 2014“…In conclusion, this finding contributes toward the development of models using evolution algorithm and statistical methods for sustainable water resources planning and management in the context of future climate change…”
Get full text
Get full text
Thesis -
16
Genetic ensemble biased ARTMAP method of ECG-Based emotion classification
Published 2012“…The optimal combination of λ and training sequence can be computed efficiently using a genetic permutation algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
17
Comparative study on the reservoir operation planning with the climate change adaptation
Published 2019“…The non-dominated sorting genetic algorithm version II (NSGA-II) was applied in both analyses to optimize the water use due to the multi-objectives demand, maximizing water release, minimizing water shortage and maximizing reservoir storage. …”
Get full text
Get full text
Get full text
Article -
18
Comparative study on the reservoir operation planning with the climate change adaptation
Published 2019“…The non-dominated sorting genetic algorithm version II (NSGA-II) was applied in both analyses to optimize the water use due to the multi-objectives demand, maximizing water release, minimizing water shortage and maximizing reservoir storage. …”
Get full text
Get full text
Get full text
Article -
19
Chiller power consumption forecasting for commercial building based on hybrid convolution neural networks-long short-term memory model with barnacles mating optimizer
Published 2025“…The study compares the proposed CNN-LSTM-BMO against other metaheuristic optimization algorithms, including Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), and Differential Evolution (DE). …”
Get full text
Get full text
Get full text
Article -
20
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis
