Search Results - adaptive ((two different) OR (_ reference)) ((evolutionary algorithm) OR (encryption algorithm))

Search alternatives:

Refine Results
  1. 1
  2. 2

    Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem by Anniza, Hamdan, San Nah, Sze, Say Leng, Goh, Kang Leng, Chiew, Wei King, Tiong

    Published 2023
    “…Two main aspects are used to classify the evolutionary algorithm variants: population-based and evolutionary strategies (variation and replacement). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…The second taxonomy is a new taxonomy proposed to classify the adaptive DE algorithms in particular into two categories (DE with adaptive parameters and DE with adaptive parameters and strategies) considering the adaptive components used in this algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy by Al-Dabbagh, Rawaa Dawoud, Neri, Ferrante, Idris, Norisma, Baba, Mohd Sapiyan

    Published 2018
    “…DE is very sensitive to its parameter settings and mutation strategy; thus, this study aims to investigate these settings with the diverse versions of adaptive DE algorithms. This study has two main objectives: (1) to present an extension for the original taxonomy of evolutionary algorithms (EAs) parameter settings that has been overlooked by prior research and therefore minimize any confusion that might arise from the former taxonomy and (2) to investigate the various algorithmic design schemes that have been used in the different variants of adaptive DE and convey them in a new classification style. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. There are two types of security for the new cryptosystem that we are concerned which are the security of Lucas function and its security against an adaptive chosen ciphertext attack. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Neural Controller Utilizing Genetic Algorithm Technique For Dynamic Systems by Ali, Marwan A

    Published 2009
    “…This research presents a method of learning multilayer Neural Network (NN) using Genetic Algorithms (GAs) techniques. The evolutionary techniques based on GAs are studied and employed for the Model Reference Adaptive Control (MRAC) scheme of different plants.…”
    Get full text
    Get full text
    Thesis
  11. 11

    An Adaptive Multi Amplitude Thresholds Embedding Algorithm for Audio Steganography by Alsabhany, A.A., Mohd Ridzuan, F.H., Azni Hazlizan Ab Halim

    Published 2024
    “…The proposed algorithm is uniquely adapted to the message size and expected to perform better than the existing algorithms.…”
    Article
  12. 12
  13. 13

    Adaptive Embedded Clonal Evolutionary Programming (AECEP) for optimal Distributed Generation (DG) location and sizing in a distribution system by Nur Zahirah, Mohd Ali

    Published 2013
    “…The purpose of this thesis is to presents a new technique namely Adaptive Embedded Clonal Evolutionary Programming (AECEP). …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    Broadening selection competitive constraint handling algorithm for faster convergence by Shaikh, T.A., Hussain, S.S., Tanweer, M.R., Hashmani, M.A.

    Published 2020
    “…Incorporating said strategy, the BSCCH algorithm has been proposed which is generic in nature and can be coupled with various evolutionary algorithms. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Adaptive medium access control protocol of Wifi-Halow for home machine-to-machine network by Liew, Jiun Terng

    Published 2019
    “…Therefore, work can be done on these aspects to improve its performance and introduce a new dimension of adaptation. Firstly, this work proposed a novel algorithm known as probability-based opportunity dynamic adaptation (PODA) of CW for home M2M network. …”
    Get full text
    Get full text
    Thesis