Search Results - adoption using differentials ((generation algorithm) OR (encryption algorithm))
Search alternatives:
- generation algorithm »
- using differentials »
- adoption using »
-
1
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Most research in the literature used fixed key expansion algorithm for encryption and decryption. …”
Get full text
Get full text
Thesis -
2
-
3
An Application of Differential Search Algorithm in Solving Non-Convex Economic Dispatch Problems with Valve-Point Effects
Published 2013“…This paper presents an application of Differential Search (DS) algorithm for solving non-convex economic dispatch (ED) problems with the valve loading effects. …”
Get full text
Get full text
Article -
4
Metaheuristic searching genetic algorithm based reliability assessment of hybrid power generation system
Published 2020“…The usefulness of the proposed algorithm was tested using Reliability Test System ‘IEEE-RTS-79’ which include both of wind power and solar power generation. …”
Get full text
Get full text
Get full text
Article -
5
Designing substitution boxes based on chaotic map and globalized firefly algorithm
Published 2019“…For this reason, the research for a new metaheuristic based S-boxes generation is still a useful endeavour. This thesis aim to provide a new design for 8 × 8 S-boxes based on firefly algorithm (FA) optimization. …”
Get full text
Get full text
Thesis -
6
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
7
Development of tool life prediction model of TiAlN coated tools during the high speed hard milling of AISI H13 steel
Published 2011“…Shunmugam et al. [7] also combined RSM with differential evolution and genetic algorithms to draw a comparison between these methods. …”
Get full text
Get full text
Get full text
Book Chapter -
8
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…To analyze email contents, we adopt the Bag-of-Words (BoW) approach and generate feature vectors whose attributes are transformed based on the normalized term frequency-inverse document frequency. …”
Get full text
Get full text
Thesis
