Search Results - adoption _ differential ((selection algorithm) OR (encryption algorithm))
Search alternatives:
- selection algorithm »
- adoption »
-
1
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
2
Performance comparison of differential evolution and particle swarm optimization in constrained optimization
Published 2012“…Here, the constrained optimization is represented by some selected standard benchmark functions. A new constraint handling and stopping criterion technique is also adopted in the optimization algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization
Published 2021“…This paper introduces a new variant of a metaheuristic algorithm based on Tiki-Taka algorithm, called selective chaotic maps Tiki-Taka algorithm (SCMTTA). …”
Get full text
Get full text
Get full text
Article -
4
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…The spectral features were performed by employing the relative spectral powers of delta (δRP), theta (θRP), alpha (αRP), beta (βRP), and gamma (γRP). The differential evolution-based channel selection algorithm (DEFS_Ch) was computed to find the most suitable EEG channels that have the greatest efficacy for identifying the various emotional states of the brain regions. …”
Get full text
Get full text
Conference or Workshop Item -
5
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…However, the learning complexity of classification is increased due to the expansion number of learning model. Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
6
Prediction of Alzheimer disease using improved MMSE ensemble regressor based on magnetic resonance images
Published 2015“…A minimal set of feature who passed the above criteria and can differentiate all of cognitive score pairs is selected by using a genetic search algorithm. …”
Get full text
Get full text
Thesis -
7
Resource allocation based on interference coordination for Multicast-Broadcast Single Frequency Network (MBSFN) / Mohd Fahmi Azman
Published 2013“…The receiver will receive multiple signals and interpret it either it is useful or destructive so that it can differentiate which signal to process. Thus, this approach will improve the spectral efficiency of the signal by only selecting the constructive signal. …”
Get full text
Get full text
Thesis -
8
Agent-Based Model of Virtual Community Cohesion (S/O: 13443)
Published 2021“…The formal specifications (differential equations) equations form the basis of algorithm development, which preceded the development of a virtual community cohesion prediction simulator. …”
Get full text
Get full text
Monograph -
9
Development of tool life prediction model of TiAlN coated tools during the high speed hard milling of AISI H13 steel
Published 2011“…Shunmugam et al. [7] also combined RSM with differential evolution and genetic algorithms to draw a comparison between these methods. …”
Get full text
Get full text
Get full text
Book Chapter -
10
Optical Packet Switching Contention Resolution Based On A Hybrid Wavelength Conversion-Fiber Delay Line Scheme
Published 2004“…Furthermore, the obtained simulation results show that by classifying packet priority, the proposed scheduling scheme and architecture are able to offer differentiated class of service.…”
Get full text
Get full text
Thesis -
11
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…To adapt to new malicious campaigns, only new types of spam emails are learned by introducing an active learning scheme into a classifier model. Here, we adopt Resource Allocating Network with Locality Sensitive Hashing (RAN-LSH) as a classifier model with data selection. …”
Get full text
Get full text
Thesis
