Search Results - evaluation case difference ((evolutionary algorithm) OR (encryption algorithm))
Search alternatives:
- evaluation case »
- case difference »
- evolutionary »
-
1
-
2
-
3
Optimization of multipurpose reservoir operation using evolutionary algorithms / Mohammed Heydari
Published 2017“…To evaluate the hybrid algorithm, optimization of hydro-power energy of Karun dams were considered. …”
Get full text
Get full text
Get full text
Thesis -
4
Enhancing solid oxide fuel cell efficiency through advanced model identification using differential evolutionary mutation fennec fox algorithm
Published 2025“…This research introduces a novel approach for optimal SOFC model identification using a differential evolutionary mutation Fennec fox algorithm (DEMFFA). …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The proposed technique is named Evolutionary Cost-Cognizant Regression Test Case Prioritization (ECRTP). …”
Get full text
Get full text
Thesis -
6
Improving the accuracy of AIRS by incorporating real world tournament selection in resource competition phase
Published 2009Get full text
Get full text
Conference or Workshop Item -
7
An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir
Published 2016Get full text
Get full text
Conference or Workshop Item -
8
-
9
Hybrid Sine Cosine and Fitness Dependent Optimizer for global optimization
Published 2021“…The findings revealed that SC-FDO achieved better performances in most cases than the original FDO and well-known optimization algorithms. …”
Get full text
Get full text
Get full text
Article -
10
A modified flower pollination algorithm and carnivorous plant algorithm for solving engineering optimization problem
Published 2021“…Both MFPA and CPA were first evaluated using twenty-five well-known benchmark functions with different characteristics and seven Congress on Evolutionary Computation (CEC) 2017 test functions. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Power system intentional islanding for different contingency scenarios using discrete optimization technique
Published 2023“…The performance of the proposed MDEP algorithm was evaluated using the IEEE 30-bus, IEEE 39-bus, and IEEE 118-bus test systems. …”
text::Thesis -
12
-
13
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Transport Layer Security (TLS) based malware is one of the most hazardous malware types, as it relies on encryption to conceal connections. Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
An optimal under frequency load shedding scheme for islanded distribution network / Amalina Izzati Md Isa
Published 2018“…Inclusive with the design of UFLS is a new module referred as Load Shedding Module (LSM). Two new algorithms i.e., Load Classification based Fuzzy Logic (LCFL) and Binary Evolutionary Programming (BEP) are introduced in the module. …”
Get full text
Get full text
Thesis -
15
Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani
Published 2015“…Optimization is performed to provide a single filterbank and multiple complimentary filterbanks. In case of multiple filterbanks the cepstral features are used in different experts for performing classification based on different representation of speeches. …”
Get full text
Get full text
Thesis
