Search Results - adoption using differentials ((generation algorithm) OR (encryption algorithm))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…Most research in the literature used fixed key expansion algorithm for encryption and decryption. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    An Application of Differential Search Algorithm in Solving Non-Convex Economic Dispatch Problems with Valve-Point Effects by M. H., Sulaiman

    Published 2013
    “…This paper presents an application of Differential Search (DS) algorithm for solving non-convex economic dispatch (ED) problems with the valve loading effects. …”
    Get full text
    Get full text
    Article
  4. 4

    Metaheuristic searching genetic algorithm based reliability assessment of hybrid power generation system by Abdalla, Ahmed N., Nazir, Muhammad Shahzad, Ming, Xin Jiang, Kadhem, Athraa Ali, Abdul Wahab, Noor Izzri, Suqun, Cao, Rendong, Ji

    Published 2020
    “…The usefulness of the proposed algorithm was tested using Reliability Test System ‘IEEE-RTS-79’ which include both of wind power and solar power generation. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Designing substitution boxes based on chaotic map and globalized firefly algorithm by Ahmed, Hussam Alddin Shihab

    Published 2019
    “…For this reason, the research for a new metaheuristic based S-boxes generation is still a useful endeavour. This thesis aim to provide a new design for 8 × 8 S-boxes based on firefly algorithm (FA) optimization. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of tool life prediction model of TiAlN coated tools during the high speed hard milling of AISI H13 steel by Amin, A. K. M. Nurul, Hafiz, A.M. Khalid, Lajis, M. A.

    Published 2011
    “…Shunmugam et al. [7] also combined RSM with differential evolution and genetic algorithms to draw a comparison between these methods. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  8. 8

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…To analyze email contents, we adopt the Bag-of-Words (BoW) approach and generate feature vectors whose attributes are transformed based on the normalized term frequency-inverse document frequency. …”
    Get full text
    Get full text
    Thesis