Search Results - (( flow ((exploration algorithm) OR (evolutionary algorithm)) ) OR ( flow encryption algorithm ))

Refine Results
  1. 1

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  2. 2

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Comparative study of optimal power flow using evolutionary programming and immune evolutionary programming technique in power system / Mohd Khairil Izwan Md Daim by Md Daim, Mohd Khairil Izwan

    Published 2006
    “…Comparison was made in order to determine the base objective function to be used for the solving Optimal Power Flow (OPF) problem. The developed algorithm was tested against on IEEE 26 bus test system.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Economic power dispatch solutions incorporating stochastic wind power generators by moth flow optimizer by Alam, Mohammad Khurshed, Mohd Herwan, Sulaiman, Sayem, Md. Shaoran, Khan, Rahat

    Published 2023
    “…This study's primary purpose is to apply state-of-the-art variations of the differential evolution (DE) algorithm for single-objective optimization and selected evolutionary algorithms for multi-objective optimization issues in power systems. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…For future works, it was recommended to explore new heuristics P2P identification using IPFIX which will commission to become a future network flow standard by IETF.…”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
    Get full text
    Get full text
    Monograph
  9. 9
  10. 10

    Evolutionary mating algorithm by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Mohd Mawardi, Saari, Hamdan, Daniyal, Mirjalili, Seyedali

    Published 2023
    “…This paper proposes a new evolutionary algorithm namely Evolutionary Mating Algorithm (EMA) to solve constrained optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A comparative study of multi-objective optimal power flow based on particle swarm, evolutionary programming, and genetic algorithm by Kahourzade, S., Mahmoudi, A., Mokhlis, Hazlie

    Published 2015
    “…This paper compares the performance of three population-based algorithms including particle swarm optimization (PSO), evolutionary programming (EP), and genetic algorithm (GA) to solve the multi-objective optimal power flow (OPF) problem. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14
  15. 15

    Hybrid flow shop scheduling problem with energy utilization using non-dominated sorting genetic algorithm-III (NSGA-III) optimization by Muhammad Ammar, Nik Mu’tasim, Mohd Fadzil Faisae, Ab Rashid

    Published 2023
    “…The model was compared with the most sought algorithm and latest multi-objective algorithms, Strength Pareto Evolutionary Algorithm 2 (SPEA -II), Multi-Objective Algorithm Particle Swarm Optimization (MOPSO), Pareto Envelope-based Selection Algorithm II (PESA-II) and Multi-objective Evolutionary Algorithm based on Decomposition (MOEA/D). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Voltage constrained optimal power flow based using genetic algorithm by Yassir Asnawi, Teuku Hasannuddin

    Published 2015
    “…In this study, Genetic Algorithm (GA) was applied to solve the problem of OPF. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    A trade-off criterion for bi-objective problem in solving hybrid flow shop scheduling with energy efficient (EE-HFS) using multi-objective dragonfly algorithm (MODA) by Muhammad Ammar, Nik Mu’tasim, Mohd Fadzil Faisae, Ab Rashid

    Published 2024
    “…The (EE-HFS) optimization has been carried out using the Multi-Objective Dragonfly Algorithm (MODA). The optimization result was compared with well-established algorithms, the Pareto Envelope-based Selection Algorithm II (PESA2), Multi-Objective Evolutionary Algorithm Based on Decomposition (MOEA/D), and new algorithms, Multi-Objective Grasshopper Optimization Algorithm (MOGOA) and Multi-Objective Ant Lion Optimizer (MOALO). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item