Search Results - adaptive ((from different) OR (_ reference)) ((evolution algorithm) OR (encryption algorithm))

Search alternatives:

Refine Results
  1. 1
  2. 2

    Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy by Al-Dabbagh, Rawaa Dawoud, Neri, Ferrante, Idris, Norisma, Baba, Mohd Sapiyan

    Published 2018
    “…A trend that has emerged recently is to make the algorithm parameters automatically adapt to different problems during optimization, thereby liberating the user from the tedious and time-consuming task of manual setting. …”
    Get full text
    Get full text
    Article
  3. 3

    Broadening selection competitive constraint handling algorithm for faster convergence by Shaikh, T.A., Hussain, S.S., Tanweer, M.R., Hashmani, M.A.

    Published 2020
    “…The median convergence traces have been compared with two different algorithms based on differential evolution, i:e: Ensemble of Constraint Handling Techniques (ECHT) and Stochastic Ranking Differential Evolution (SRDE). …”
    Get full text
    Get full text
    Article
  4. 4

    An Adaptive Multi Amplitude Thresholds Embedding Algorithm for Audio Steganography by Alsabhany, A.A., Mohd Ridzuan, F.H., Azni Hazlizan Ab Halim

    Published 2024
    “…The proposed algorithm is uniquely adapted to the message size and expected to perform better than the existing algorithms.…”
    Article
  5. 5

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. There are two types of security for the new cryptosystem that we are concerned which are the security of Lucas function and its security against an adaptive chosen ciphertext attack. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A comparative study for parameter selection in online auctions by Gan, Kim Soon

    Published 2009
    “…In this work, three different models of genetic algorithms are considered. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Evolution strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…It becomes a vital problem to achieve CB as the distributed sensor nodes are unaware of their phase relationship. An iterative algorithm using evolution strategy (ES) is proposed to achieve phase alignment at the intended location in static channels, which require one-bit feedback from the receiver destination. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Channel quality indicator for long term evolution system based on adaptive threshold feedback compression scheme by Abdulhasan, Muntadher Qasim

    Published 2014
    “…This thesis proposes an adaptive feedback algorithm that uses a threshold scheme to enhance the system throughput while maintaining low Block Error Rate (BLER), Bit Error Rate (BER), and overhead. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem by Anniza, Hamdan, San Nah, Sze, Say Leng, Goh, Kang Leng, Chiew, Wei King, Tiong

    Published 2023
    “…The adaptability of evolutionary algorithm mechanisms provides diverse approaches to handle combinatorial optimization challenges. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Comparative study on the reservoir operation planning with the climate change adaptation by Nurul Nadrah Aqilah, Tukimat, Sobri, Harun

    Published 2019
    “…The study was divided into two sections; Analysis 1 refers to the reservoir optimization adapted with the climate assessment. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Comparative study on the reservoir operation planning with the climate change adaptation by Nurul Nadrah Aqilah, Tukimat, Sobri, Harun

    Published 2019
    “…The study was divided into two sections; Analysis 1 refers to the reservoir optimization adapted with the climate assessment. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Evoluation strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…It becomes a vital problem to achieve CB as the distributed sensor nodes are unaware of their phase relationship. An iterative algorithm using evolution strategy (ES) is proposed to achieve phase alignment at the intended location in static channels, which require one-bit feedback from the receiver destination. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…Smart grid is an evolution from conventional power grid in which power communication system has migrated from one-way to bi-directional communication network. …”
    text::Thesis
  18. 18

    Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced by Ahmed-Abdulazeez, Mariam Ovayioza

    Published 2018
    “…The HHPO and the MC-HOD algorithms achieves significant enhancement compared to the conventional and other algorithms examined. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Performance evaluation of hybrid adaptive neuro-fuzzy inference system models for predicting monthly global solar radiation by Halabi, Laith M., Mekhilef, Saad, Hossain, Monowar

    Published 2018
    “…In this paper, standalone adaptive neuro-fuzzy inference system and hybrid models have been developed to predict monthly global solar radiation from different meteorological parameters such as sunshine duration S(h), and air temperature. …”
    Get full text
    Get full text
    Article
  20. 20

    Handover algorithm with joint processing technique based on coordinated multipoint (COMP) transmission and reception in LTE-advanced heterogeneous network / Muhammad Aiman Zainali by Zainali, Muhammad Aiman

    Published 2020
    “…Then, mathematical equations have been derived from the proposed framework by incorporating the value of user’s speed and handover signaling delay in adaptive Reference Signal Received Power (RSRP) threshold. …”
    Get full text
    Get full text
    Thesis