Search Results - (( flow ((exploration algorithm) OR (pollination algorithm)) ) OR ( flow encryption algorithm ))
Search alternatives:
- exploration algorithm »
- pollination algorithm »
-
1
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
2
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…For future works, it was recommended to explore new heuristics P2P identification using IPFIX which will commission to become a future network flow standard by IETF.…”
Get full text
Get full text
Thesis -
4
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
5
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
6
-
7
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
Get full text
Get full text
Thesis -
8
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Stochastic process and tutorial of the African buffalo optimization
Published 2022“…Finally, benchmarking the good experimental output of the ABO with those of the popular, highly effective and efficient Cuckoo Search and Flower Pollination Algorithm underscores the ABO as a worthy contribution to the existing body of population-based optimization algorithms…”
Get full text
Get full text
Get full text
Article -
10
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Thesis -
11
Optimize the maximum flow of electricity capacity using Ford Fulkerson, Edmonds Karp and Goldberg Tarjan algorithm / Nik Nur Diyana Nik Mohd Huzaidi
Published 2024“…This research explores the optimization of electricity flow using the Ford Fulkerson, Edmonds Karp, and Goldberg Tarjan algorithms. …”
Get full text
Get full text
Thesis -
12
Stochastic process and tutorial of the African bufalo optimization
Published 2022“…Finally, benchmarking the good experimental output of the ABO with those of the popular, highly effective and efficient Cuckoo Search and Flower Pollination Algorithm underscores the ABO as a worthy contribution to the existing body of population-based optimization algorithms…”
Get full text
Get full text
Get full text
Article -
13
An improved wavelet digital watermarking software implementation
Published 2011Get full text
Get full text
Get full text
Book Chapter -
14
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…The HFPSO technique hybridizes the Firefly Optimization (FFO) algorithm and the Particle Swarm Optimization (PSO) method to improve the exploitation and exploration strategies and enhance the convergence rate. …”
Get full text
Get full text
Thesis -
15
Modeling and optimization of cost-based hybrid flow shop scheduling problem using metaheuristics
Published 2023“…This paper aims to develop a computational model and test the exploration capability of metaheuristics algorithms while optimizing the CHFS problem. …”
Get full text
Get full text
Get full text
Article -
16
Energy-aware scheduling optimization in hybrid flow shops using artificial bee colony algorithm
Published 2024“…Through an extensive computational experiment involving a well-known benchmark suite, the ABC algorithm demonstrated remarkable performance, consistently outperforming several popular metaheuristic algorithms, including Genetic Algorithms, Particle Swarm Optimization, Memetic Algorithms, and Whale Optimization Algorithm in 75% of the problems. …”
Get full text
Get full text
Get full text
Article -
17
A review of wave-net identical learning & filling-in in a decomposition space of (JPG-JPEG) sampled images
Published 2010“…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
Get full text
Get full text
Article -
18
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…This study introduces a novel meta-heuristic optimization algorithm known as quasi-oppositional modified Jaya (QOMJaya) to solve different multi-objective optimal power flow (MOOPF) problems. …”
Get full text
Get full text
Get full text
Article -
19
Greedy-assisted teaching-learning-based optimization algorithm for cost-based hybrid flow shop scheduling
Published 2025“…Unlike previous studies that focus on isolated cost factors, this research formulated an integrated mathematical model for CHF holistically capturing labor, energy consumption, maintenance, and late penalty costs. The GTLBO algorithm incorporates a unique hybrid initialization strategy, generating 10 % of the initial population using a Greedy algorithm to enhance exploration efficiency. …”
Get full text
Get full text
Get full text
Article -
20
Decentralized traffic signal control for grid traffic network using genetic algorithm
Published 2019“…This work aims to explore the potential to minimize traffic congestion using a non-deterministic algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings
