Search Results - evaluation case difference ((evolutionary algorithm) OR (encryption algorithm))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1
  2. 2
  3. 3

    Optimization of multipurpose reservoir operation using evolutionary algorithms / Mohammed Heydari by Mohammed , Heydari

    Published 2017
    “…To evaluate the hybrid algorithm, optimization of hydro-power energy of Karun dams were considered. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The proposed technique is named Evolutionary Cost-Cognizant Regression Test Case Prioritization (ECRTP). …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Hybrid Sine Cosine and Fitness Dependent Optimizer for global optimization by Chiu, Po Chan, Ali, Selamat, Ondrej, Krejcar, Kuok, King Kuok

    Published 2021
    “…The findings revealed that SC-FDO achieved better performances in most cases than the original FDO and well-known optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A modified flower pollination algorithm and carnivorous plant algorithm for solving engineering optimization problem by Ong, Kok Meng

    Published 2021
    “…Both MFPA and CPA were first evaluated using twenty-five well-known benchmark functions with different characteristics and seven Congress on Evolutionary Computation (CEC) 2017 test functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Power system intentional islanding for different contingency scenarios using discrete optimization technique by Nur Zawani Binti Saharuddin

    Published 2023
    “…The performance of the proposed MDEP algorithm was evaluated using the IEEE 30-bus, IEEE 39-bus, and IEEE 118-bus test systems. …”
    text::Thesis
  12. 12
  13. 13

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Transport Layer Security (TLS) based malware is one of the most hazardous malware types, as it relies on encryption to conceal connections. Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An optimal under frequency load shedding scheme for islanded distribution network / Amalina Izzati Md Isa by Md Isa, Amalina Izzati

    Published 2018
    “…Inclusive with the design of UFLS is a new module referred as Load Shedding Module (LSM). Two new algorithms i.e., Load Classification based Fuzzy Logic (LCFL) and Binary Evolutionary Programming (BEP) are introduced in the module. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani by Mirhassani, Seyedmostafa

    Published 2015
    “…Optimization is performed to provide a single filterbank and multiple complimentary filterbanks. In case of multiple filterbanks the cepstral features are used in different experts for performing classification based on different representation of speeches. …”
    Get full text
    Get full text
    Thesis