Search Results - based location differences ((encryption algorithm) OR (evolutionary algorithm))
Search alternatives:
- based location »
- differences »
-
1
Optimal Charging Strategy for Plug-in Hybrid Electric Vehicle Using Evolutionary Algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir
Published 2016Get full text
Get full text
Conference or Workshop Item -
4
-
5
A novel secret key generation based on image link
Published 2023“…One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. …”
Article -
6
A novel secret key generation based on image link
Published 2018“…One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Optimization of multipurpose reservoir operation using evolutionary algorithms / Mohammed Heydari
Published 2017“…The described model was resolved by linear programming and evolutionary algorithms in Microsoft Excel (Solver). …”
Get full text
Get full text
Get full text
Thesis -
8
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
9
A trade-off criterion for bi-objective problem in solving hybrid flow shop scheduling with energy efficient (EE-HFS) using multi-objective dragonfly algorithm (MODA)
Published 2024“…The MODA outperformed other algorithms based on the convergence metric and was on par with different algorithms for spacing and maximum spread metrics optimization results. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…While the result of FFT algorithm summarizes that the number of the common FFT peak location index for sensors on the same subject is significantly higher compared to the number of common feature for sensors on different subjects.…”
Get full text
Get full text
Get full text
Get full text
Thesis
