Search Results - adoption based differential ((generation algorithm) OR (detection algorithm))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…The specific aims in employing DEAM-based SPCS are to investigate a strategy to resolve the line overloading issue through the N-1 contingency based on the load flow analysis and the severity index develop SPCS scheme through the generation rescheduling strategy based on the hybrid DEAM algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization by Kamal Z., Zamli, Abdul Kader, ., Fakhrud Din, ., Alhadawi, Hussam S.

    Published 2021
    “…To address the nonlinear requirement of cryptography (i.e., ensuring the generated S-box is sufficiently robust against linear and differential cryptanalysis attacks), many chaos-based metaheuristic algorithms have been developed in the literature. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm by Al-Qazzaz, Noor Kamal, Sabir, Mohannad K., Md. Ali, Sawal Hamid, Ahmad, Siti Anom, Grammer, Karl

    Published 2019
    “…The spectral features were performed by employing the relative spectral powers of delta (δRP), theta (θRP), alpha (αRP), beta (βRP), and gamma (γRP). The differential evolution-based channel selection algorithm (DEFS_Ch) was computed to find the most suitable EEG channels that have the greatest efficacy for identifying the various emotional states of the brain regions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Designing substitution boxes based on chaotic map and globalized firefly algorithm by Ahmed, Hussam Alddin Shihab

    Published 2019
    “…In this context, the proposed algorithm utilizes a new design for retrieving strong S- boxes based on standard firefly algorithm (SFA). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Image Based Oil Palm Tree Crowns Detection by Muhammad Afif Zakwan, Zaili

    Published 2020
    “…Image Based Oil Palm Tree Crowns Detection system is a basic system that enables the detection of oil palm tree crowns from red, green and blue (RGB) aerial images. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  8. 8

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…In this thesis, new algorithms are proposed for the key generation, encryption and decryption module of KD-3D-CA block cipher based on von Neumann (3D) cellular automata. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In order to find new types of spam emails, an outlier detection mechanism is implemented in RAN-LSH. To analyze email contents, we adopt the Bag-of-Words (BoW) approach and generate feature vectors whose attributes are transformed based on the normalized term frequency-inverse document frequency. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Two parameters (population size and generation numbers) are adaptively adopted from number of remaining ranking features. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of tool life prediction model of TiAlN coated tools during the high speed hard milling of AISI H13 steel by Amin, A. K. M. Nurul, Hafiz, A.M. Khalid, Lajis, M. A.

    Published 2011
    “…Shunmugam et al. [7] also combined RSM with differential evolution and genetic algorithms to draw a comparison between these methods. …”
    Get full text
    Get full text
    Get full text
    Book Chapter