Search Results - ((new algorithm) OR (based algorithm))
Search alternatives:
-
1
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
2
A New Bats Echolocation-based Algorithm for Single Objective Optimisation
Published 2016“…With this in mind, an adaptive bats sonar algorithm is introduced with new paradigms of real bats echolocation behaviour. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Opposition-based Whale Optimization Algorithm
Published 2018“…In order to improve solution accuracy and reliability, this paper proposes a new algorithm based on WOA. The new algorithm called Opposition-based Whale Optimization (OWOA). …”
Get full text
Get full text
Get full text
Article -
4
Propose a New Machine Learning Algorithm based on Cancer Diagnosis
Published 2018“…In this review, we focus on the current status of machine learning applications in cancer research, also propose a new algorithm Fast Learning Network to work based on cancer research.…”
Get full text
Get full text
Get full text
Article -
5
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
6
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
7
Fast zerox algorithm for routing in optical multistage interconnection networks.
Published 2010“…It is shown that using the new iCM, the original ZeroX algorithm is simplified, thus improved the algorithm by reducing the time to complete routing process. …”
Get full text
Get full text
Article -
8
Optimizing large scale combinatorial problems using multiple ant colonies algorithm based on pheromone evaluation technique
Published 2008“…The new algorithm is based on the ant colony system and utilizes average and maximum pheromone evaluation mechanisms. …”
Get full text
Get full text
Get full text
Article -
9
A New Optimization Algorithm based on Copulation Behavior of Simine Jackals
Published 2011“…This work introduces a new meta-heuristic algorithm, termed as Simine Jackal algorithm, designed to solve optimization problems. …”
Get full text
Conference or Workshop Item -
10
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…A modified version of the SKF algorithm, named Opposition-Based SKF (OBSKF), introduced by K. …”
Get full text
Get full text
Thesis -
11
A new standardisation and selection framework for real-time image dehazing algorithms from multi-foggy scenes based on fuzzy Delphi and hybrid multi-criteria decision analysis methods
Published 2020“…Given the rapid development of dehazing image algorithms, selecting the optimal algorithm based on multiple criteria is crucial in determining the efficiency of an algorithm. …”
Get full text
Get full text
Get full text
Article -
12
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…Finally, a new signed-digit {0,1,3}-NAF scalar multiplication algorithm is proposed to utilize the new scalar representation and the new tripling operation. …”
Get full text
Get full text
Thesis -
13
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
Published 2015“…The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. …”
Get full text
Get full text
Article -
14
DYNAMIC PRICING ALGORITHM IN PARKING SYSTEMS
Published 2020“…This algorithm will be built differently and the analysis will be done on whether the new algorithm will be an improvement to the previous algorithm done in another paper. …”
Get full text
Get full text
Final Year Project -
15
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…It is a new approach which performs core operation using multiplication of points based in ECC. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
16
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article -
17
WCBP: A new water cycle based back propagation algorithm for data classification
Published 2016“…The performance of the proposed Water Cycle based Back-Propagation (WCBP) algorithm is compared with the conventional BPNN, ABC-BP and ABC-LM algorithms on selected benchmark classification problems from UCI Machine Learning Repository. …”
Get full text
Get full text
Article -
18
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The use of the BOGSA algorithm aims to create a new equation for the calculation of the masses of population individuals, as found in the theoretical work in the Strength Pareto Evolutionary Algorithm two (SPEAII) algorithm. …”
Get full text
Get full text
Thesis -
19
New algorithms to minimize handoff latency in AMTree protocol
Published 2009“…In this paper the authors present two new algorithms to minimize the handoff latency in AMTree protocol. …”
Get full text
Get full text
Get full text
Article -
20
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Article
