Search Results - adoption from different ((encryption algorithm) OR (evolutionary algorithm))

Search alternatives:

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem by Anniza, Hamdan, San Nah, Sze, Say Leng, Goh, Kang Leng, Chiew, Wei King, Tiong

    Published 2023
    “…Research works published from the year 2018 to 2022 are identified in terms of problem representation and evolutionary strategies adopted. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Evolutionary mating algorithm by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Mohd Mawardi, Saari, Hamdan, Daniyal, Mirjalili, Seyedali

    Published 2023
    “…This paper proposes a new evolutionary algorithm namely Evolutionary Mating Algorithm (EMA) to solve constrained optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Optimal coordination of overcurrent relay protection using evolutionary programming / Noor Shah Rizal Abdul Manap by Noor Shah Rizal, Abdul Manap

    Published 2018
    “…Due to the difficulty of existing techniques employing different types of algorithm, the usual optimal coordination of overcurrent relays is generally carried out by heuristic, meta-heuristic optimization methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Hybrid harmony search algorithm for continuous optimization problems by Ala’a Atallah, Hamad Alomoush

    Published 2020
    “…Harmony Search (HS) algorithm has been extensively adopted in the literature to address optimization problems in many different fields, such as industrial design, civil engineering, electrical and mechanical engineering problems. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Optimal chiller loading solution for energy conservation using Barnacles Mating Optimizer algorithm by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2022
    “…To demonstrate the effectiveness of proposed BMO, it is tested on three different chiller systems. The obtained results from BMO are compared with other well-known optimization algorithms in the literature. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Prediction of Alzheimer disease using improved MMSE ensemble regressor based on magnetic resonance images by Farzan, Ali

    Published 2015
    “…A reduction from 69.1 to 50.2 is achieved for the proposed evolutionary hypothesis test. …”
    Get full text
    Get full text
    Thesis