Search Results - adaptive ((two different) OR (_ reference)) ((encryption algorithm) OR (evolutionary algorithm))
Search alternatives:
- two different »
-
1
-
2
Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem
Published 2023“…Two main aspects are used to classify the evolutionary algorithm variants: population-based and evolutionary strategies (variation and replacement). …”
Get full text
Get full text
Get full text
Get full text
Article -
3
-
4
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
5
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…The second taxonomy is a new taxonomy proposed to classify the adaptive DE algorithms in particular into two categories (DE with adaptive parameters and DE with adaptive parameters and strategies) considering the adaptive components used in this algorithm. …”
Get full text
Get full text
Thesis -
6
Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy
Published 2018“…DE is very sensitive to its parameter settings and mutation strategy; thus, this study aims to investigate these settings with the diverse versions of adaptive DE algorithms. This study has two main objectives: (1) to present an extension for the original taxonomy of evolutionary algorithms (EAs) parameter settings that has been overlooked by prior research and therefore minimize any confusion that might arise from the former taxonomy and (2) to investigate the various algorithmic design schemes that have been used in the different variants of adaptive DE and convey them in a new classification style. …”
Get full text
Get full text
Article -
7
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
8
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
9
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009“…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. There are two types of security for the new cryptosystem that we are concerned which are the security of Lucas function and its security against an adaptive chosen ciphertext attack. …”
Get full text
Get full text
Get full text
Article -
10
Neural Controller Utilizing Genetic Algorithm Technique For Dynamic Systems
Published 2009“…This research presents a method of learning multilayer Neural Network (NN) using Genetic Algorithms (GAs) techniques. The evolutionary techniques based on GAs are studied and employed for the Model Reference Adaptive Control (MRAC) scheme of different plants.…”
Get full text
Get full text
Thesis -
11
An Adaptive Multi Amplitude Thresholds Embedding Algorithm for Audio Steganography
Published 2024“…The proposed algorithm is uniquely adapted to the message size and expected to perform better than the existing algorithms.…”
Article -
12
-
13
Adaptive Embedded Clonal Evolutionary Programming (AECEP) for optimal Distributed Generation (DG) location and sizing in a distribution system
Published 2013“…The purpose of this thesis is to presents a new technique namely Adaptive Embedded Clonal Evolutionary Programming (AECEP). …”
Get full text
Get full text
Thesis -
14
-
15
-
16
-
17
Broadening selection competitive constraint handling algorithm for faster convergence
Published 2020“…Incorporating said strategy, the BSCCH algorithm has been proposed which is generic in nature and can be coupled with various evolutionary algorithms. …”
Get full text
Get full text
Article -
18
-
19
-
20
Adaptive medium access control protocol of Wifi-Halow for home machine-to-machine network
Published 2019“…Therefore, work can be done on these aspects to improve its performance and introduce a new dimension of adaptation. Firstly, this work proposed a novel algorithm known as probability-based opportunity dynamic adaptation (PODA) of CW for home M2M network. …”
Get full text
Get full text
Thesis
