Search Results - (( flow ((exploration algorithm) OR (evolutionary algorithm)) ) OR ( flow encryption algorithm ))
Search alternatives:
- exploration algorithm »
-
1
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
2
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Comparative study of optimal power flow using evolutionary programming and immune evolutionary programming technique in power system / Mohd Khairil Izwan Md Daim
Published 2006“…Comparison was made in order to determine the base objective function to be used for the solving Optimal Power Flow (OPF) problem. The developed algorithm was tested against on IEEE 26 bus test system.…”
Get full text
Get full text
Thesis -
4
Economic power dispatch solutions incorporating stochastic wind power generators by moth flow optimizer
Published 2023“…This study's primary purpose is to apply state-of-the-art variations of the differential evolution (DE) algorithm for single-objective optimization and selected evolutionary algorithms for multi-objective optimization issues in power systems. …”
Get full text
Get full text
Get full text
Article -
5
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…For future works, it was recommended to explore new heuristics P2P identification using IPFIX which will commission to become a future network flow standard by IETF.…”
Get full text
Get full text
Thesis -
6
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
7
-
8
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
9
-
10
Evolutionary mating algorithm
Published 2023“…This paper proposes a new evolutionary algorithm namely Evolutionary Mating Algorithm (EMA) to solve constrained optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
A comparative study of multi-objective optimal power flow based on particle swarm, evolutionary programming, and genetic algorithm
Published 2015“…This paper compares the performance of three population-based algorithms including particle swarm optimization (PSO), evolutionary programming (EP), and genetic algorithm (GA) to solve the multi-objective optimal power flow (OPF) problem. …”
Get full text
Get full text
Get full text
Article -
12
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
Get full text
Get full text
Thesis -
13
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
-
15
Hybrid flow shop scheduling problem with energy utilization using non-dominated sorting genetic algorithm-III (NSGA-III) optimization
Published 2023“…The model was compared with the most sought algorithm and latest multi-objective algorithms, Strength Pareto Evolutionary Algorithm 2 (SPEA -II), Multi-Objective Algorithm Particle Swarm Optimization (MOPSO), Pareto Envelope-based Selection Algorithm II (PESA-II) and Multi-objective Evolutionary Algorithm based on Decomposition (MOEA/D). …”
Get full text
Get full text
Get full text
Article -
16
-
17
Voltage constrained optimal power flow based using genetic algorithm
Published 2015“…In this study, Genetic Algorithm (GA) was applied to solve the problem of OPF. …”
Get full text
Get full text
Get full text
Article -
18
-
19
A decomposition/aggregation method for solving electrical power dispatch problems
Published 2023Subjects:Conference paper -
20
A trade-off criterion for bi-objective problem in solving hybrid flow shop scheduling with energy efficient (EE-HFS) using multi-objective dragonfly algorithm (MODA)
Published 2024“…The (EE-HFS) optimization has been carried out using the Multi-Objective Dragonfly Algorithm (MODA). The optimization result was compared with well-established algorithms, the Pareto Envelope-based Selection Algorithm II (PESA2), Multi-Objective Evolutionary Algorithm Based on Decomposition (MOEA/D), and new algorithms, Multi-Objective Grasshopper Optimization Algorithm (MOGOA) and Multi-Objective Ant Lion Optimizer (MOALO). …”
Get full text
Get full text
Get full text
Conference or Workshop Item
