Search Results - (( flow ((exploration algorithm) OR (evolution algorithm)) ) OR ( flow encryption algorithm ))

Refine Results
  1. 1

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  2. 2

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…For future works, it was recommended to explore new heuristics P2P identification using IPFIX which will commission to become a future network flow standard by IETF.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Economic power dispatch solutions incorporating stochastic wind power generators by moth flow optimizer by Alam, Mohammad Khurshed, Mohd Herwan, Sulaiman, Sayem, Md. Shaoran, Khan, Rahat

    Published 2023
    “…This study's primary purpose is to apply state-of-the-art variations of the differential evolution (DE) algorithm for single-objective optimization and selected evolutionary algorithms for multi-objective optimization issues in power systems. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Comparative study of optimal power flow using evolutionary programming and immune evolutionary programming technique in power system / Mohd Khairil Izwan Md Daim by Md Daim, Mohd Khairil Izwan

    Published 2006
    “…Comparison was made in order to determine the base objective function to be used for the solving Optimal Power Flow (OPF) problem. The developed algorithm was tested against on IEEE 26 bus test system.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Water level forecasting using feed forward neural networks optimized by African Buffalo Algorithm (ABO) by Ahmed, Ehab Ali

    Published 2019
    “…Weakness such as trapped in local minima, slow convergence and finding a good rate between exploitation and exploration of the search space. This research proposed a swarm intelligence training algorithm, Improved African Buffalo Optimization algorithm (IABO) based on the Metaheuristic method called the African Buffalo Optimization algorithm (ABO). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Optimal placement of unified power flow controller by dynamic implementation of system-variable-based voltage-stability indices to enhance voltage stability by Ahmad, S., Albatsh, F.M., Mekhilef, Saad, Mokhlis, Hazlie

    Published 2016
    “…Furthermore, to verify the suitability of the explored locations, a comparative study has been conducted after placing UPFC in the present locations and other locations obtained using optimization techniques like particle swarm optimization (PSO), differential evolution (DE), genetic algorithm (GA), and bacteria foraging algorithm (BFA). …”
    Get full text
    Get full text
    Article
  10. 10

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Multiobjective differential evolution algorithm-based sizing of a standalone photovoltaic water pumping system by Muhsen D.H., Ghazali A.B., Khatib T.

    Published 2023
    “…Algorithms; Costs; Evolutionary algorithms; Flow of water; Life cycle; Meteorology; Multiobjective optimization; Optimization; Probability; Pumping plants; Pumps; Solar power generation; Differential Evolution; Lifecycle costs; Meteorological data; Multi-objective differential evolution algorithms; Objective functions; Photovoltaic; Photovoltaic water pumping; Solar waters; Loss of load probability…”
    Article
  14. 14

    Channel-aware downlink scheduling for quality of service in long term evolution network by Najim, Alaa Omer

    Published 2018
    “…These constraints comprise the use of an inefficient method to determine delay by the buffer size. In the proposed algorithm we, utilize Head of Line delay with channel-related parameters such as user data rate in addition to several pre-defined QoS tunable parameters to formulate a rule that prioritizes different user flows assigned with channel resources in order to improve delay. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Ant colony optimization and genetic algorithm models for suspended sediment discharge estimation for gorgan-river, Iran by Mohammad Reza Pour, Omolbani

    Published 2011
    “…In the first part of this study, the sample data, which included suspended sediment discharge and flow discharge, were used as the inputs to the ant colony optimization and genetic algorithm models to identify the relationship between the suspended sediment discharge and flow discharge. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Performance analysis of uplink scheduling algorithms in the urban and rural environments in LTE / Shafinaz Ismail, Darmawaty Mohd Ali and Norsuzlia Ya'acob by Ismail, Shafinaz, Mohd Ali, Darmawaty, Ya'acob, Norsuzlia

    Published 2018
    “…The simulation results show that RR algorithm always reaches the lowest PLR among those strategies and RR is the most suitable scheduling algorithms for VoIP and video flows while FME is better for BE flows in both urban and rural environment in LTE networks.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An implementation of differential evolution algorithm for a single product and single period multi-echelon supply chain network model by Ayda, Emdadian, Ponnambalam, S. G., Kanagaraj, G.

    Published 2018
    “…In this paper, five variants of Differential Evolution (DE) algorithms are proposed to solve the multi-echelon supply chain network optimization problem. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    A New Hybrid Approach Based On Discrete Differential Evolution Algorithm To Enhancement Solutions Of Quadratic Assignment Problem by Asaad Shakir, Hameed, Mohd Aboobaider, Burhanuddin, Mutar, Modhi Lafta, Ngo, Hea Choon

    Published 2020
    “…With QAP, each facility is allocated to just one location, thereby reducing cost in terms of aggregate distances weighted by flow values. The primary aim of this study is to propose a hybrid approach which combines Discrete Differential Evolution (DDE) algorithm and Tabu Search (TS) algorithm to enhance solutions of QAP model, to reduce the distances between the locations by finding the best distribution of N facilities to N locations, and to implement hybrid approach based on discrete differential evolution (HDDETS) on many instances of QAP from the benchmark. …”
    Get full text
    Get full text
    Get full text
    Article