Search Results - evaluation case difference ((evolution algorithm) OR (encryption algorithm))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1
  2. 2

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…Among the latest Evaluation Algorithm (EA) have been developed is Differential Evolution (DE). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Dual optimization approach in discrete Hopfield neural network by Guo, Yueling, Zamri, Nur Ezlin, Mohd Kasihmuddin, Mohd Shareduwan, Alway, Alyaa, Mansor, Mohd. Asyraf, Li, Jia, Zhang, Qianhong

    Published 2024
    “…This research utilizes Y-Type Random 2 Satisfiability, which combines first and second-order clauses to expand the storage capacity of DHNN models, facilitating the retrieval of optimal final neuron states. To evaluate the effectiveness of the Hybrid Differential Evolution Algorithm and Swarm Mutation in the learning and retrieval phases, several performance metrics are employed in terms of synaptic weight management, learning errors, testing errors, energy profiles, solution variations, and similarity for 10 different cases. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Transport Layer Security (TLS) based malware is one of the most hazardous malware types, as it relies on encryption to conceal connections. Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7