Search Results - (( flow ((generation algorithm) OR (selection algorithm)) ) OR ( flow encryption algorithm ))

Refine Results
  1. 1

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
    Get full text
    Thesis
  2. 2

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  3. 3

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…This paper introduces TLSMalDetect, a TLS-based malware detection approach that integrates periodicity-independent entropy-based flow set (EFS) features generated by a flow feature transformation technique to solve flow feature utilization issues in related research. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    An improved wavelet digital watermarking software implementation by Khalifa, Othman Omran, Yusof, Yusnita

    Published 2011
    “…This includes general work flow, proposed algorithms for both original method and improved method, which were named as subband matching and selective subband matching, respectively and various attacks performed for evaluation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  6. 6

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…The Diffie-Hellman key exchange and Rivest Shamir Adleman (RSA) key generation algorithms have been used to authenticate the receiver, and key generation for encrypting and decrypting processes, respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Optimal power flow incorporating stochastic wind and solar generation by metaheuristic optimizers by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2021
    “…To assess the performance of these selected metaheuristic algorithms on OPF, a modified IEEE 30-bus system that incorporate the stochastic wind and solar power generators will be used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Optimal power flow with renewable power generations using hyper-heuristic technique by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2024
    “…This paper presents a strategy to solve the Optimal Power Flow (OPF) problem solution, which considers the presence of renewable energy power generators such as wind, solar, and small hydro generation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  9. 9

    Economic power dispatch solutions incorporating stochastic wind power generators by moth flow optimizer by Alam, Mohammad Khurshed, Mohd Herwan, Sulaiman, Sayem, Md. Shaoran, Khan, Rahat

    Published 2023
    “…In this investigation, we employ the recently created metaheuristic algorithm known as the moth flow optimizer (MFO), which allows us to answer all five of the optimal power flow (OPF) difficulty objective functions: (1) reducing the cost of power generation (including stochastic solar and thermal power generation), (2) diminished power, (3) voltage variation, (4) emissions, and (5) reducing both the cost of power generating and emissions. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Optimal power flow solutions for power system operations using moth-flame optimization algorithm by Salman Ameen Ali, Abdullah Alabd

    Published 2021
    “…In this thesis, a recent metaheuristic nature-inspired optimization algorithm namely: Moth-Flame Optimizer (MFO) is applied to solve the two subproblems of Optimal power flow (OPF) namely: Economic dispatch (ED) and Optimal reactive power dispatch (ORPD) simultaneously. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Immune network algorithm in monthly streamflow prediction at Johor river by Mat Ali, Nur Izzah, Abdul Malik, Marlinda, Ismail , Amelia Ritahani

    Published 2014
    “…This study proposes an alternative method in generating future stream flow data with single-point river stage. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Immune network algorithm in monthly streamflow prediction at Johor river by Mat Ali, Nur Izzah, Abdul Malek, Marlinda, Ismail, Amelia Ritahani

    Published 2015
    “…This study proposes an alternative method in generating future stream flow data with single-point river stage. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    PLANNING OF MULTIPLE FEEDERS ELECTRICAL DISTRIBUTION SYSTEM by NORDIN, AHMAD SOLLEHIN

    Published 2011
    “…In this project, several algorithms are implemented to design an electrical distribution system which are (1) Optimal Feeder Path Algorithm, (2) Modified Load Flow Algorithm, (3) Optimal Branch Conductor Selection Algorithm, and ( 4) Optimal Location of Substation Algorithm. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Solving optimal power flow problem with stochastic wind–solar–small hydro power using barnacles mating optimizer by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2021
    “…To assess the performance of BMO into OPF problem, modified IEEE 30-bus and IEEE 57-bus systems that incorporate the stochastic wind–solar–small hydro power generators will be employed. Statistical studies are performed to show the feasible and effectiveness of BMO compared with other selected metaheuristic algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Immune network algorithm in monthly streamflow prediction at Johor river by Ali N.I.M., Malek M.A., Ismail A.R.

    Published 2023
    “…This study proposes an alternative method in generating future stream flow data with single-point river stage. …”
    Article
  16. 16

    The Use of Artificial Neural Networks and Genetic Algorithms for Effectively Optimizing Production from Multiphase Flow Wells by Ayoub, Mohammed Abdalla

    Published 2010
    “…Moreover, the output from the ANNs will be utilized plus selected other input parameters as controlling variables for optimizing the production from a multiphase producing field using Genetic Algorithms (GA).…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Modelling of optimized hybrid debris flow using airborne laser scanning data in Malaysia by Lay, Usman Salihu

    Published 2019
    “…Cuckoo search), and evaluator or model inducing algorithms (e.g SVM) were utilized for feature subset selection, which further compared to select the optimal conditioning factors subset. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A trade-off criterion for bi-objective problem in solving hybrid flow shop scheduling with energy efficient (EE-HFS) using multi-objective dragonfly algorithm (MODA) by Muhammad Ammar, Nik Mu’tasim, Mohd Fadzil Faisae, Ab Rashid

    Published 2024
    “…The (EE-HFS) optimization has been carried out using the Multi-Objective Dragonfly Algorithm (MODA). The optimization result was compared with well-established algorithms, the Pareto Envelope-based Selection Algorithm II (PESA2), Multi-Objective Evolutionary Algorithm Based on Decomposition (MOEA/D), and new algorithms, Multi-Objective Grasshopper Optimization Algorithm (MOGOA) and Multi-Objective Ant Lion Optimizer (MOALO). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
    Get full text
    Get full text
    Monograph
  20. 20