Search Results - adoption from different ((optimization algorithm) OR (encryption algorithm))

Search alternatives:

Refine Results
  1. 1

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Hybrid harmony search algorithm for continuous optimization problems by Ala’a Atallah, Hamad Alomoush

    Published 2020
    “…Harmony Search (HS) algorithm has been extensively adopted in the literature to address optimization problems in many different fields, such as industrial design, civil engineering, electrical and mechanical engineering problems. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem by Anniza, Hamdan, San Nah, Sze, Say Leng, Goh, Kang Leng, Chiew, Wei King, Tiong

    Published 2023
    “…The mechanisms and strategies used in evolutionary algorithms to address different types of combinatorial optimization problems are discovered. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Genetic algorithm based mass distribution optimization of quadruped leg robot for walking performance enhancement by Loo, Shing Yan

    Published 2013
    “…In the conditions of fixed walking cycle, preset walking pattern and limited torque generation in actuators, genetic algorithm is adopted to optimize the walking distance of the robot by varying the masses of torso, upper limb and lower limb, ranging from 0.01kg to 5kg. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Zebra optimization algorithm for feature selection by Faizan, Muhammad, Muhammad Arif, Mohamad

    Published 2026
    “…This algorithm is adopted by inspiring the social behavior and movements strategies of zebras in wildlife. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Finite impulse response optimizers for solving optimization problems by Tasiransurini, Ab Rahman

    Published 2019
    “…SAFIRO differs from MAFIRO in term of the number of agents. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Finite impulse response optimizers for solving optimization problems by Ab Rahman, Tasiransurini

    Published 2019
    “…SAFIRO differs from MAFIRO in term of the number of agents. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion by Haque, Ariful

    Published 2018
    “…Our experience indicates that all the algorithms generate nearly similar number of test cases, but in terms of performance, they differ from one another. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Evolutionary mating algorithm by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Mohd Mawardi, Saari, Hamdan, Daniyal, Mirjalili, Seyedali

    Published 2023
    “…The algorithm is based on the adoption of random mating concept from Hardy–Weinberg equilibrium and crossover index in order to produce new offspring. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Gradient-based mutation manta ray foraging optimization (gbm-mrfo) for solving constrained real-world problems by Ahmad Azwan, Abdul Razak, Ahmad Nor Kasruddin, Nasir

    Published 2022
    “…MRFO is a recently new introduced algorithm that consists of strategy of foraging adopted by Manta Ray while Gradient-based Mutation (GbM) is a feasibility-and solution repair strategy adopted from ϵ-Matrix-Adaptation Evolution Strategy (ϵ-MAES). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Optimal chiller loading solution for energy conservation using Barnacles Mating Optimizer algorithm by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2022
    “…To demonstrate the effectiveness of proposed BMO, it is tested on three different chiller systems. The obtained results from BMO are compared with other well-known optimization algorithms in the literature. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Computational intelligence based power tracing for nondiscriminatory losses charge allocation and voltage stability improvement. / Zulkifli Abdul Hamid by Abdul Hamid, Zulkifli

    Published 2013
    “…At first, in producing a good optimization algorithm, a hybridization technique was proposed for adopting the finest features of two different algorithms; namely the Genetic Algorithm (GA) and continuous domain Ant Colony Optimization (ACOR). …”
    Get full text
    Get full text
    Book Section
  18. 18
  19. 19

    A hyper-heuristic based strategy for image segmentation using multilevel thresholding by Luqman, Fakhrud Din, Shah Khalid, Kamal Zuhairi Zamli, Aftab Alam

    Published 2025
    “…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper