Search Results - adoption ((_ differences) OR (from different)) ((evolution algorithm) OR (encryption algorithm))
Search alternatives:
- evolution algorithm »
-
1
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
3
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…Furthermore, the right and left occipital channels may help in identifying happiness, sadness, surprise and neutral emotional states. The DEFS_Ch algorithm raised the linear discriminant analysis (LDA) classification accuracy from 80% to 86.85%, indicating that DEFS_Ch may offer a useful way for reliable enhancement of the detection of different emotional states of the brain regions.…”
Get full text
Get full text
Conference or Workshop Item -
4
A comparative study for parameter selection in online auctions
Published 2009“…In this work, three different models of genetic algorithms are considered. …”
Get full text
Get full text
Get full text
Thesis -
5
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
6
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
8
Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem
Published 2023“…The mechanisms and strategies used in evolutionary algorithms to address different types of combinatorial optimization problems are discovered. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
Get full text
Get full text
Thesis -
10
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
11
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Channel quality indicator for long term evolution system based on adaptive threshold feedback compression scheme
Published 2014“…The percentage difference is 2.1%,compared with the full feedback method, with only 0.5% degradation. …”
Get full text
Get full text
Thesis -
13
Gradient-based mutation manta ray foraging optimization (gbm-mrfo) for solving constrained real-world problems
Published 2022“…MRFO is a recently new introduced algorithm that consists of strategy of foraging adopted by Manta Ray while Gradient-based Mutation (GbM) is a feasibility-and solution repair strategy adopted from ϵ-Matrix-Adaptation Evolution Strategy (ϵ-MAES). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…In order to estimate the quality of ‘pruned’ features, self-adaptive DE algorithm is proposed. Two parameters (population size and generation numbers) are adaptively adopted from number of remaining ranking features. …”
Get full text
Get full text
Thesis -
16
Robust Portfolio Mean-Variance Optimization for Capital Allocation in Stock Investment Using the Genetic Algorithm: A Systematic Literature Review
Published 2024journal::journal article -
17
Enhancing clustering algorithm with initial centroids in tool wear region recognition
Published 2020“…It is conflicting with the standard K-means that return different clustering structure in each run, while K-means + + replicates several times to achieve minimum objective function. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid
Published 2017“…The grand average of the surface runoff output for the period of the study ranged from 18.621 mm to 113.293 mm. The month of November experienced the highest monthly runoffs for all three different settings. …”
Get full text
Get full text
Thesis -
19
Delay-Aware Energy-Efficient Joint Power Control and Mode Selection in Device-to-Device Communications for FREEDM Systems in Smart Grids
Published 2024“…Cellular technology with long-term evolution (LTE)-based standards is a promising technology for smart grid communication networks. …”
Article -
20
The duality of technological innovation and dynamic capabilities: the micro-foundation of China's construction machinery industry's rise up the global value chain
Published 2024“…Future research can further explore the long-term evolution path of technological innovation duality and its differences in cross-cultural contexts.…”
Get full text
Get full text
Get full text
Article
