Search Results - adoption a difference ((optimization algorithm) OR (encryption algorithm))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Review of Nature Inspired Metaheuristic Algorithm Selection for Combinatorial t-way Testing by Muazu, A.A., Hashim, A.S., Sarlan, A.

    Published 2022
    “…This is to inspire future research in the field of combinatorial t-way testing for better optimization. Thus, we found that all metaheuristics has a simple structure to be adopted in different areas for becoming a more efficient in optimization. …”
    Get full text
    Get full text
    Article
  6. 6

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancing three variants of harmony search algorithm for continuous optimization problems by Alomoush, Alaa A., Alsewari, Abdulrahman A., Kamal Z., Zamli, Alrosan, Ayat, Alomoush, Waleed, Alissa, Khalid

    Published 2021
    “…Different variants of HS introduced in the literature to enhance the algorithm and fix its problems, but in most cases, the algorithm still has a slow convergence rate. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An Arithmetic-Trigonometric Optimization Algorithm with Application for Control of Real-Time Pressure Process Plant by Devan, P.A.M., Hussin, F.A., Ibrahim, R.B., Bingi, K., Nagarajapandian, M., Assaad, M.

    Published 2022
    “…The proposed algorithm adopts different trigonometric functions, namely sin, cos, and tan, with the conventional sine cosine algorithm (SCA) and arithmetic optimization algorithm (AOA) to improve the convergence rate and optimal search area in the exploration and exploitation phases. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Hybrid harmony search algorithm for continuous optimization problems by Ala’a Atallah, Hamad Alomoush

    Published 2020
    “…Harmony Search (HS) algorithm has been extensively adopted in the literature to address optimization problems in many different fields, such as industrial design, civil engineering, electrical and mechanical engineering problems. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem by Anniza, Hamdan, San Nah, Sze, Say Leng, Goh, Kang Leng, Chiew, Wei King, Tiong

    Published 2023
    “…The evolutionary algorithm has been extensively used to solve a range of combinatorial optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A survey : particle swarm optimization-based algorithms for grid computing scheduling systems. by Ambursa, Faruku Umar, Latip, Rohaya

    Published 2013
    “…This study surveys PSObased scheduling algorithms for Grid systems and presents a classification for the various approaches adopted. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…This combination provides a secure key management mechanism and data hiding to provide strong encryption and decryption standards. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Genetic algorithm based mass distribution optimization of quadruped leg robot for walking performance enhancement by Loo, Shing Yan

    Published 2013
    “…In the conditions of fixed walking cycle, preset walking pattern and limited torque generation in actuators, genetic algorithm is adopted to optimize the walking distance of the robot by varying the masses of torso, upper limb and lower limb, ranging from 0.01kg to 5kg. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review by Fayaz, Muhammad, Arshad, Shakeel, Shah, Abdul Salam, Shah, Asadullah

    Published 2018
    “…Generally, different terminologies and different styles have been adopted for writing pseudo code for different algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Zebra optimization algorithm for feature selection by Faizan, Muhammad, Muhammad Arif, Mohamad

    Published 2026
    “…This algorithm is adopted by inspiring the social behavior and movements strategies of zebras in wildlife. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Finite impulse response optimizers for solving optimization problems by Tasiransurini, Ab Rahman

    Published 2019
    “…The first algorithm is a single-agent-based algorithm, named Single-agent FIR optimizer (SAFIRO). …”
    Get full text
    Get full text
    Thesis
  20. 20

    An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion by Haque, Ariful

    Published 2018
    “…The algorithms are used to generate test cases for nine different Boolean expressions of different size and complexities. …”
    Get full text
    Get full text
    Thesis