Search Results - assessing comparative performance ((evolution algorithm) OR (encryption algorithm))

Search alternatives:

Refine Results
  1. 1

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…In this research work, the performance analysis of the AAḃ scheme produced remarkable timing improvements for the encryption and decryption of messages when compared to previous trials on a numeric computing environment. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Data hiding in medical images using encryption and steganography techniques by Nur Athirah, Abdul Razak

    Published 2019
    “…In the end of this research, the performance of the algorithm will be assessed in the aspect of mean square error and peak signal noise ratio to compare the results of the chosen method.…”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A comparative study of evolutionary algorithms and adapting control parameters for estimating the parameters of a single-diode photovoltaic module's model by Muhsen D.H., Ghazali A.B., Khatib T., Abed I.A.

    Published 2023
    “…Algorithms; Diodes; Errors; Iterative methods; Least squares approximations; Mean square error; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Coefficient of determination; Differential Evolution; Electromagnetism-like algorithm; Hybrid evolutionary algorithm; Photovoltaic; Photovoltaic modules; Root mean square errors; Single-diode models; Evolutionary algorithms; algorithm; comparative study; electromagnetic method; estimation method; experimental design; numerical method; parameterization; performance assessment; photovoltaic system…”
    Article
  6. 6
  7. 7

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…The efficiency of EFS features is assessed in two ways: (1) by comparing them to the relevant related work’s features of outliers and flow using four feature importance methods, and (2) by analyzing the classification performance in the scenarios with and without EFS features. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…However, most of the existing embedding algorithms are incapable of overcoming the adverse effects of the challenges simultaneously. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods by Kadhem, Athraa Ali

    Published 2017
    “…This study sought to examine the performance of three newly proposed techniques, for reliability assessment of the power systems, namely Disparity Evolution Genetic Algorithm (DEGA), Binary Particle Swarm Optimisation (BPSO), and Differential Evolution Optimization Algorithm (DEOA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Finally, the performance of the proposed methods is also assessed using the performance indicators such as various error measurement criteria, detection rate and false alarm and compared with recent works. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Vibrant search mechanism for numerical optimization functions by Shambour, Moh’d Khaled Yousef

    Published 2018
    “…The effectiveness of the proposed technique is assessed through harmony search algorithm (HSA). The performance of this mechanism is examined with several types of benchmark optimization functions, and the results are compared with those of the classic version and two variants of HSA. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…EFS features effectiveness was evaluated in two ways: (1) by comparing them to the corresponding outliers percentage and flow features using four feature importance methods, and (2) by analyzing classification performance with and without EFS features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A femtocell cross-tier interference mitigation technique in OFDMA-LTE system: a cuckoo search based approach by Al-omari, Motea, Ramli, Abd Rahman, Sali, A., Azmir, Raja Syamsul

    Published 2016
    “…Results/Conclusions: The simulation results reveal that RACSA mitigate the cross-tier interference and improve the system performance. In addition, an assessment is carried out and it confirmed that RACSA gives (38%) and (21%) higher system throughput and (14%) and (35%) higher in spectral efficiency and (55%) and (33%) lower in the outage probability when comparing with results of genetic algorithm and auction algorithm respectively.…”
    Get full text
    Get full text
    Article
  15. 15

    SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid by Khalid, Khairi

    Published 2017
    “…The research aims to evaluate the performance and hydrological response of the Soil Water Assessment Tool (SWAT) process-based model in tropical river basin using Malaysia soil data. …”
    Get full text
    Get full text
    Thesis
  16. 16

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…An experiment was conducted to assess the performance of the proposed method. The proposed method proved to be safe from NoSQLInjection attacks when compared with formal methods. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…An experiment was conducted to assess the performance of the proposed method. The proposed method proved to be safe from NoSQLInjection attacks when compared with formal methods. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20

    Impacting clinical evaluation of anterior talofibular ligament injuries through analysis of ultrasound images by Singh, V., Elamvazuthi, I., Jeoti, V., George, J., Swain, A., Kumar, D.

    Published 2016
    “…The algorithm is tested on 25 subjects' datasets and the corresponding performance metrics are evaluated to demonstrate its clinical applicability. …”
    Get full text
    Get full text
    Article