Search Results - adoption from different ((evolutionary algorithm) OR (encryption algorithm))
Search alternatives:
- adoption from »
- evolutionary »
-
1
Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem
Published 2023“…Research works published from the year 2018 to 2022 are identified in terms of problem representation and evolutionary strategies adopted. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Evolutionary mating algorithm
Published 2023“…This paper proposes a new evolutionary algorithm namely Evolutionary Mating Algorithm (EMA) to solve constrained optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Optimal coordination of overcurrent relay protection using evolutionary programming / Noor Shah Rizal Abdul Manap
Published 2018“…Due to the difficulty of existing techniques employing different types of algorithm, the usual optimal coordination of overcurrent relays is generally carried out by heuristic, meta-heuristic optimization methods. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Hybrid harmony search algorithm for continuous optimization problems
Published 2020“…Harmony Search (HS) algorithm has been extensively adopted in the literature to address optimization problems in many different fields, such as industrial design, civil engineering, electrical and mechanical engineering problems. …”
Get full text
Get full text
Thesis -
7
Biogeography based optimization (BBO) algorithm to minimise non-productive time during hole-making process
Published 2015“…The performance of proposed algorithm is evaluated based on various test problems adopted from the literature. …”
Get full text
Get full text
Get full text
Article -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
9
-
10
Optimal chiller loading solution for energy conservation using Barnacles Mating Optimizer algorithm
Published 2022“…To demonstrate the effectiveness of proposed BMO, it is tested on three different chiller systems. The obtained results from BMO are compared with other well-known optimization algorithms in the literature. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Prediction of Alzheimer disease using improved MMSE ensemble regressor based on magnetic resonance images
Published 2015“…A reduction from 69.1 to 50.2 is achieved for the proposed evolutionary hypothesis test. …”
Get full text
Get full text
Thesis
