Search Results - addition _ (differentiated OR different) ((evolutionary algorithm) OR (encryption algorithm))
Search alternatives:
- evolutionary »
-
1
-
2
Exploring dynamic self-adaptive populations in differential evolution
Published 2006“…Although the Differential Evolution (DE) algorithm has been shown to be a simple yet powerful evolutionary algorithm for optimizing continuous functions, users are still faced with the problem of preliminary testing and hand-tuning of the evolutionary parameters prior to commencing the actual optimization process. …”
Get full text
Get full text
Get full text
Article -
3
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The suggested method enhances the non-linearity of the S-Box, offering a dynamic solution that effectively defends against linear and differential cryptanalysis. Additionally, a DNA-based ShiftRow function was proposed to enhance the execution of permutation by methodically displacing the rows of the state array using different offset values. …”
Get full text
Get full text
Thesis -
4
Enhancing solid oxide fuel cell efficiency through advanced model identification using differential evolutionary mutation fennec fox algorithm
Published 2025“…This research introduces a novel approach for optimal SOFC model identification using a differential evolutionary mutation Fennec fox algorithm (DEMFFA). …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Multi-Objectives Memetic Discrete Differential Evolution Algorithm for Solving the Container Pre-Marshalling Problem
Published 2019“…In addition, it improves the exploration and exploitation capabilities of the algorithm. …”
Get full text
Get full text
Article -
6
Artificial Neural Controller Synthesis in Autonomous Mobile Cognition
Published 2009“…The Pareto-frontier Differential Evolution (PDE) algorithm is utilized to generate the Pareto optimal sets through a 3-layer feed-forward artificial neural network that optimize the conflicting objectives of robot behavior and network complexity, where the two different types of robot behaviors are phototaxis and RF-localization, respectively. …”
Get full text
Get full text
Article -
7
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…In addition, Triple Data Encryption Standard (3DES) was also simulated as the encryption algorithm to compare the speedup performance with AES encryption.…”
Get full text
Get full text
Thesis -
8
Artificial Neural Controller Synthesis in Autonomous Mobile Cognition
Published 2009“…The Pareto-frontier Differential Evolution (PDE) algorithm is utilized to generate the Pareto optimal sets through a 3-layer feed-forward artificial neural network that optimize the conflicting objectives of robot behavior and network complexity, where the two different types of robot behaviors are phototaxis and RF-localization, respectively. …”
Get full text
Get full text
Get full text
Article -
9
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
10
Reusable data-path architecture for encryption-then-authentication on FPGA
Published 2023“…Reuse of resources or identical functions however require controllers that enable sharing of data path that can also has different �rounds� of transforms required for different modes either PHOTON or LED in this case, in addition to controllers for individual algorithm. …”
Article -
11
Data driven hybrid evolutionary analytical approach for multi objective location allocation decisions: Automotive green supply chain empirical evidence
Published 2018“…Data driven hybrid evolutionary analytical approach is proposed by integrating Non-Dominated Sorting Genetic Algorithm-II (NSGA-II) to handle multiple objectives into Differential Evolution (DE) algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
Get full text
Get full text
Thesis -
13
Forecasting solar power generation using evolutionary mating algorithm-deep neural networks
Published 2024“…This paper proposes an integration of recent metaheuristic algorithm namely Evolutionary Mating Algorithm (EMA) in optimizing the weights and biases of deep neural networks (DNN) for forecasting the solar power generation. …”
Get full text
Get full text
Get full text
Article -
14
The performance of the 3DES and Fernet encryption in securing data files
Published 2024“…In addition, this study evaluates the temporal efficiency for the encryption process. …”
Get full text
Article -
15
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
16
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Lastly, a new hybrid technique suggests tackling the current image encryption application problem by using the estimated parameters of chaotic systems with an optimization algorithm, the SKF algorithm. …”
Get full text
Get full text
Thesis -
17
The performance of the 3DES and fernet encryption in securing data files
Published 2024“…In addition, this study evaluates the temporal efficiency for the encryption process. …”
Get full text
Get full text
Get full text
Article -
18
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
19
A hybrid optimization technique for solving economic emission load dispatch problems
Published 2023text::Final Year Project -
20
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. Permutation and substitution approaches of image encryption were deployed to address the issue of images volume and differing sizes. …”
Get full text
Get full text
Get full text
Article
