Search Results - adapted from different ((evolutionary algorithm) OR (encryption algorithm))

Search alternatives:

Refine Results
  1. 1

    Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem by Anniza, Hamdan, San Nah, Sze, Say Leng, Goh, Kang Leng, Chiew, Wei King, Tiong

    Published 2023
    “…The adaptability of evolutionary algorithm mechanisms provides diverse approaches to handle combinatorial optimization challenges. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy by Al-Dabbagh, Rawaa Dawoud, Neri, Ferrante, Idris, Norisma, Baba, Mohd Sapiyan

    Published 2018
    “…A trend that has emerged recently is to make the algorithm parameters automatically adapt to different problems during optimization, thereby liberating the user from the tedious and time-consuming task of manual setting. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Adaptive Embedded Clonal Evolutionary Programming (AECEP) for optimal Distributed Generation (DG) location and sizing in a distribution system by Nur Zahirah, Mohd Ali

    Published 2013
    “…The purpose of this thesis is to presents a new technique namely Adaptive Embedded Clonal Evolutionary Programming (AECEP). …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. There are two types of security for the new cryptosystem that we are concerned which are the security of Lucas function and its security against an adaptive chosen ciphertext attack. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Adaptive medium access control protocol of Wifi-Halow for home machine-to-machine network by Liew, Jiun Terng

    Published 2019
    “…Therefore, work can be done on these aspects to improve its performance and introduce a new dimension of adaptation. Firstly, this work proposed a novel algorithm known as probability-based opportunity dynamic adaptation (PODA) of CW for home M2M network. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Hybrid harmony search algorithm for continuous optimization problems by Ala’a Atallah, Hamad Alomoush

    Published 2020
    “…Harmony Search (HS) algorithm has been extensively adopted in the literature to address optimization problems in many different fields, such as industrial design, civil engineering, electrical and mechanical engineering problems. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Hybrid MPPT algorithm for mismatch photovoltaic panel application / Muhammad Iqbal Mohd Zakki by Mohd Zakki, Muhammad Iqbal

    Published 2019
    “…On the other hand, the implementation of conventional direct MPPT technique causes oscillation in MPP tracking due to the perturbative nature of the algorithms. Otherwise, the soft-computation MPPT methods by evolutionary algorithms such as Particle Swarm Optimization (PSO) algorithm require longer tracking time to prevent the false MPP tracking convergence. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Broadening selection competitive constraint handling algorithm for faster convergence by Shaikh, T.A., Hussain, S.S., Tanweer, M.R., Hashmani, M.A.

    Published 2020
    “…Incorporating said strategy, the BSCCH algorithm has been proposed which is generic in nature and can be coupled with various evolutionary algorithms. …”
    Get full text
    Get full text
    Article
  17. 17

    A modified flower pollination algorithm and carnivorous plant algorithm for solving engineering optimization problem by Ong, Kok Meng

    Published 2021
    “…CPA, on the other hand, was developed based on the inspiration from how carnivorous plants adapt to survive in harsh environments. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An optimal under frequency load shedding scheme for islanded distribution network / Amalina Izzati Md Isa by Md Isa, Amalina Izzati

    Published 2018
    “…Inclusive with the design of UFLS is a new module referred as Load Shedding Module (LSM). Two new algorithms i.e., Load Classification based Fuzzy Logic (LCFL) and Binary Evolutionary Programming (BEP) are introduced in the module. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani by Mirhassani, Seyedmostafa

    Published 2015
    “…Current automatic speech recognition (ASR) systems adapted to adult’s speech are inefficient for recognition of children’s speeches because they suffer from lack of discriminative speech features. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Three dimensional printing of bone tissue engineering scaffold: Design, structure, and mechanical properties / Mitra Asadi-Eydivand by Mitra Asadi, Eydivand

    Published 2016
    “…Hence, this project had designed and developed the optimal processing parameters based on the design of the experimental approach and evolutionary algorithms to evaluate the ability of commercial 3D printers for making calcium sulfate-based or in other words, commercial-materials-based scaffold prototypes. …”
    Get full text
    Get full text
    Thesis