Search Results - (( flow ((evolution algorithm) OR (selection algorithm)) ) OR ( flow encryption algorithm ))

Search alternatives:

Refine Results
  1. 1

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
    Get full text
    Thesis
  2. 2

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  3. 3

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
    Get full text
    Get full text
    Thesis
  4. 4

    An improved wavelet digital watermarking software implementation by Khalifa, Othman Omran, Yusof, Yusnita

    Published 2011
    “…This includes general work flow, proposed algorithms for both original method and improved method, which were named as subband matching and selective subband matching, respectively and various attacks performed for evaluation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  5. 5

    Channel-aware downlink scheduling for quality of service in long term evolution network by Najim, Alaa Omer

    Published 2018
    “…The output results indicate that the proposed DoRA scheduling algorithm outperforms DBWPF in providing a minimum level of end-to-end delay.…”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Economic power dispatch solutions incorporating stochastic wind power generators by moth flow optimizer by Alam, Mohammad Khurshed, Mohd Herwan, Sulaiman, Sayem, Md. Shaoran, Khan, Rahat

    Published 2023
    “…This study's primary purpose is to apply state-of-the-art variations of the differential evolution (DE) algorithm for single-objective optimization and selected evolutionary algorithms for multi-objective optimization issues in power systems. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
    Get full text
    Get full text
    Monograph
  8. 8

    The femtocell - macrocell deployment towards the QoS provisioning in LTE network / Hasyimah Ahmad by Ahmad, Hasyimah

    Published 2016
    “…LTE-Sim is used to simulate the LTE-Femto network scenario and three packet scheduling algorithms; PF, MLWDF and EXP/PF were selected for downlink transmission to analyze the performance metrics of the triple play applications. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Application of the Hybrid Artificial Neural Network Coupled with Rolling Mechanism and Grey Model Algorithms for Streamflow Forecasting Over Multiple Time Horizons by Yaseen, Zaher Mundher, Fu, Minglei, Wang, Chen, Mohtar, Wan Hanna Melini Wan, Deo, Ravinesh C., El-Shafie, Ahmed

    Published 2018
    “…The rolling mechanism method is applied to smooth out the dataset based on the antecedent values of the model inputs before being applied to the GM algorithm. The optimization of the input datasets selection was performed using auto-correlation (ACF) and partial auto-correlation (PACF) functions. …”
    Get full text
    Get full text
    Article
  11. 11

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Multiobjective differential evolution algorithm-based sizing of a standalone photovoltaic water pumping system by Muhsen D.H., Ghazali A.B., Khatib T.

    Published 2023
    “…Algorithms; Costs; Evolutionary algorithms; Flow of water; Life cycle; Meteorology; Multiobjective optimization; Optimization; Probability; Pumping plants; Pumps; Solar power generation; Differential Evolution; Lifecycle costs; Meteorological data; Multi-objective differential evolution algorithms; Objective functions; Photovoltaic; Photovoltaic water pumping; Solar waters; Loss of load probability…”
    Article
  13. 13

    Shear strength test on unsaturated soil using natural microscopic surface tension force / Basharudin Abdul Hadi by Abdul Hadi, Basharudin

    Published 2017
    “…There were two sets of algorithms in developing the UPLRB ANN model and every algorithm set consisted of model inputs data preparation, neural network 29 30 base of the specimen until the flow ceased..…”
    Get full text
    Get full text
    Book Section
  14. 14

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Performance analysis of uplink scheduling algorithms in the urban and rural environments in LTE / Shafinaz Ismail, Darmawaty Mohd Ali and Norsuzlia Ya'acob by Ismail, Shafinaz, Mohd Ali, Darmawaty, Ya'acob, Norsuzlia

    Published 2018
    “…The simulation results show that RR algorithm always reaches the lowest PLR among those strategies and RR is the most suitable scheduling algorithms for VoIP and video flows while FME is better for BE flows in both urban and rural environment in LTE networks.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An implementation of differential evolution algorithm for a single product and single period multi-echelon supply chain network model by Ayda, Emdadian, Ponnambalam, S. G., Kanagaraj, G.

    Published 2018
    “…In this paper, five variants of Differential Evolution (DE) algorithms are proposed to solve the multi-echelon supply chain network optimization problem. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A New Hybrid Approach Based On Discrete Differential Evolution Algorithm To Enhancement Solutions Of Quadratic Assignment Problem by Asaad Shakir, Hameed, Mohd Aboobaider, Burhanuddin, Mutar, Modhi Lafta, Ngo, Hea Choon

    Published 2020
    “…With QAP, each facility is allocated to just one location, thereby reducing cost in terms of aggregate distances weighted by flow values. The primary aim of this study is to propose a hybrid approach which combines Discrete Differential Evolution (DDE) algorithm and Tabu Search (TS) algorithm to enhance solutions of QAP model, to reduce the distances between the locations by finding the best distribution of N facilities to N locations, and to implement hybrid approach based on discrete differential evolution (HDDETS) on many instances of QAP from the benchmark. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Thesis