Search Results - (( _ optimization algorithm ) OR ( flow encryption algorithm ))

Search alternatives:

Refine Results
  1. 1

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  3. 3

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    A review of wave-net identical learning & filling-in in a decomposition space of (JPG-JPEG) sampled images by Al-Azzawi, Alaa Khamees, Saripan, M. Iqbal, Jantan, Adznan, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
    Get full text
    Get full text
    Article
  11. 11

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…Its optimality has inspired the development of a metaheuristic algorithm called Heuristic Kalman Algorithm (HKA) in 2009. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimization of multi-holes drilling path using particle swarm optimization by Najwa Wahida, Zainal Abidin, M. F. F., Ab Rashid, N. M. Zuki, N. M.

    Published 2018
    “…PSO is also compared with another algorithm like Whale Optimization Algorithm, Ant Lion Optimizer, Dragonfly Algorithm, Grasshopper Optimization Algorithm, Moth-flame Optimization and Sine Cosine Algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  15. 15

    Optimization and discretization of dragonfly algorithm for solving continuous and discrete optimization problems by Bibi Amirah Shafaa, Emambocus

    Published 2024
    “…Based on the experimental results, the optimized DA algorithm is a much better training algorithm for ANNs as compared to the usual gradient-descent backpropagation algorithm since the resultant ANNs trained by the optimized DA achieve higher accuracy. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A memory-based gravitational search algorithm for enhancing minimum variance distortionless response beamforming by Darzi S., Sieh Kiong T., Tariqul Islam M., Rezai Soleymanpour H., Kibria S.

    Published 2023
    “…Algorithms; Artificial intelligence; Beamforming; Benchmarking; Heuristic algorithms; Iterative methods; Learning algorithms; Particle swarm optimization (PSO); Adaptive Beamforming; Gravitational search algorithm (GSA); Gravitational search algorithms; Heuristic optimization algorithms; Minimum variance distortionless response; Optimal trajectories; Optimization problems; Real-world optimization; Optimization…”
    Article
  17. 17

    Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem by Anniza, Hamdan, San Nah, Sze, Say Leng, Goh, Kang Leng, Chiew, Wei King, Tiong

    Published 2023
    “…Other metaheuristic approaches such as genetic algorithm, differential evolution algorithm, particle swarm optimization, and ant colony optimization are still preferable to address combinatorial optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A hybrid bat�swarm algorithm for optimizing dam and reservoir operation by Yaseen Z.M., Allawi M.F., Karami H., Ehteram M., Farzin S., Ahmed A.N., Koting S.B., Mohd N.S., Jaafar W.Z.B., Afan H.A., El-Shafie A.

    Published 2023
    “…Dams; Irrigation; Particle swarm optimization (PSO); Bat algorithms; Global optimal solutions; Hybrid optimization algorithm; Multi-reservoir systems; Optimization algorithms; Optimization modeling; Particle swarm optimization algorithm; Reservoir operation; Reservoirs (water)…”
    Article
  19. 19

    Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm by Mohammed, Zahraa Abdulkareem

    Published 2017
    “…These two algorithms are compared to their original artificial intelligence algorithms, i.e. particle swarm optimization algorithm and genetic algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Optimization of hydropower reservoir operation based on hedging policy using Jaya algorithm by Chong K.L., Lai S.H., Ahmed A.N., Wan Jaafar W.Z., El-Shafie A.

    Published 2023
    “…Ant colony optimization; Hydroelectric power; Hydroelectric power plants; Investments; Particle swarm optimization (PSO); Reservoirs (water); Stream flow; Water supply; Ant colony algorithms; Hydro-power generation; Hydropower reservoirs; Optimization algorithms; Particle swarm optimization algorithm; Reservoir performance; Streamflow generations; Uncertainty and variability; Genetic algorithms…”
    Article