Search Results - assessing comparative performance ((evolution algorithm) OR (encryption algorithm))
Search alternatives:
- comparative performance »
- assessing comparative »
- evolution algorithm »
-
1
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…In this research work, the performance analysis of the AAḃ scheme produced remarkable timing improvements for the encryption and decryption of messages when compared to previous trials on a numeric computing environment. …”
Get full text
Get full text
Thesis -
2
Data hiding in medical images using encryption and steganography techniques
Published 2019“…In the end of this research, the performance of the algorithm will be assessed in the aspect of mean square error and peak signal noise ratio to compare the results of the chosen method.…”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
Get full text
Get full text
Get full text
Thesis -
4
Lao-3d: A Symmetric Lightweight Block Cipher Based on 3d Permutation for Mobile Encryption Application
Published 2024journal::journal article -
5
A comparative study of evolutionary algorithms and adapting control parameters for estimating the parameters of a single-diode photovoltaic module's model
Published 2023“…Algorithms; Diodes; Errors; Iterative methods; Least squares approximations; Mean square error; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Coefficient of determination; Differential Evolution; Electromagnetism-like algorithm; Hybrid evolutionary algorithm; Photovoltaic; Photovoltaic modules; Root mean square errors; Single-diode models; Evolutionary algorithms; algorithm; comparative study; electromagnetic method; estimation method; experimental design; numerical method; parameterization; performance assessment; photovoltaic system…”
Article -
6
-
7
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…The efficiency of EFS features is assessed in two ways: (1) by comparing them to the relevant related work’s features of outliers and flow using four feature importance methods, and (2) by analyzing the classification performance in the scenarios with and without EFS features. …”
Get full text
Get full text
Thesis -
8
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…However, most of the existing embedding algorithms are incapable of overcoming the adverse effects of the challenges simultaneously. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods
Published 2017“…This study sought to examine the performance of three newly proposed techniques, for reliability assessment of the power systems, namely Disparity Evolution Genetic Algorithm (DEGA), Binary Particle Swarm Optimisation (BPSO), and Differential Evolution Optimization Algorithm (DEOA). …”
Get full text
Get full text
Get full text
Thesis -
11
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Finally, the performance of the proposed methods is also assessed using the performance indicators such as various error measurement criteria, detection rate and false alarm and compared with recent works. …”
Get full text
Get full text
Thesis -
12
Vibrant search mechanism for numerical optimization functions
Published 2018“…The effectiveness of the proposed technique is assessed through harmony search algorithm (HSA). The performance of this mechanism is examined with several types of benchmark optimization functions, and the results are compared with those of the classic version and two variants of HSA. …”
Get full text
Get full text
Get full text
Article -
13
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…EFS features effectiveness was evaluated in two ways: (1) by comparing them to the corresponding outliers percentage and flow features using four feature importance methods, and (2) by analyzing classification performance with and without EFS features. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
A femtocell cross-tier interference mitigation technique in OFDMA-LTE system: a cuckoo search based approach
Published 2016“…Results/Conclusions: The simulation results reveal that RACSA mitigate the cross-tier interference and improve the system performance. In addition, an assessment is carried out and it confirmed that RACSA gives (38%) and (21%) higher system throughput and (14%) and (35%) higher in spectral efficiency and (55%) and (33%) lower in the outage probability when comparing with results of genetic algorithm and auction algorithm respectively.…”
Get full text
Get full text
Article -
15
SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid
Published 2017“…The research aims to evaluate the performance and hydrological response of the Soil Water Assessment Tool (SWAT) process-based model in tropical river basin using Malaysia soil data. …”
Get full text
Get full text
Thesis -
16
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…An experiment was conducted to assess the performance of the proposed method. The proposed method proved to be safe from NoSQLInjection attacks when compared with formal methods. …”
Get full text
Get full text
Conference or Workshop Item -
17
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…An experiment was conducted to assess the performance of the proposed method. The proposed method proved to be safe from NoSQLInjection attacks when compared with formal methods. …”
Get full text
Get full text
Conference or Workshop Item -
18
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
19
Remote Monitoring of COVID-19 Patients Using Multisensor Body Area Network Innovative System
Published 2023Article -
20
Impacting clinical evaluation of anterior talofibular ligament injuries through analysis of ultrasound images
Published 2016“…The algorithm is tested on 25 subjects' datasets and the corresponding performance metrics are evaluated to demonstrate its clinical applicability. …”
Get full text
Get full text
Article
