Search Results - (( flow ((optimization algorithm) OR (extraction algorithm)) ) OR ( flow encryption algorithm ))
Search alternatives:
- extraction algorithm »
-
1
An improved wavelet digital watermarking software implementation
Published 2011“…Modification was made to the algorithms where only selected matching subbands were used in embedding and extracting the watermark in this improved method. …”
Get full text
Get full text
Get full text
Book Chapter -
2
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…This study introduces a novel meta-heuristic optimization algorithm known as quasi-oppositional modified Jaya (QOMJaya) to solve different multi-objective optimal power flow (MOOPF) problems. …”
Get full text
Get full text
Get full text
Article -
3
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
ANALYSIS AND OPTIMIZATION OF HYDROCYCLONE GEOMETRY USING BOX-BEHNKEN AND MULTI-OBJECTIVE OPTIMIZATION ALGORITHM
Published 2021“…The lack of understanding and non-linear modelling of hydrocyclone geometry against performances hamper any optimization process. Therefore, the objectives of this research are to investigate hydrocyclone geometrical parameters impact onto performance (pressure drop, flow split and separation efficiency) using Box-Behnken, analysis of multivariate analysis of variance of geometrical parameters against performances and investigate and validate the effectiveness of multi objective optimization algorithm. …”
Get full text
Get full text
Thesis -
6
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
7
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
8
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…In addition, a method of utilizing Convolutional Neural Network (CNN) is used for the detection of vehicles from roadway camera outputs to apply video processing techniques and extract the desired information. Specifically, the paper utilized the YOLOv5s architecture coupled with k-means algorithm to perform anchor box optimization under different illumination levels. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Optimization of multi-agent traffic network system with Q-Learning-Tune fitness function
Published 2019“…The idea is proposed in effort of accessing the functionality of the proposed algorithm to improve the smoothness of traffic flow in a network. …”
Get full text
Get full text
Get full text
Thesis -
10
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
Get full text
Get full text
Thesis -
11
Development of a multi criteria decision support system using convolutional neural network and jaya algorithm for water resources management / Chong Kai Lun
Published 2021“…Apart from that, having low values in four of the performance criteria: RMSE, MAE, NSE, and RSR, have further strengthened the credibility of the results. As for the optimization process, the reservoir operation rule was derived using a meta-heuristic algorithm at the monthly interval. …”
Get full text
Get full text
Get full text
Thesis -
12
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Application of genetic algorithm method to optimize flow shop sequencing problem as the title of this project is the study about the method used in order to optimize flow shop sequencing problem. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Optimize the maximum flow of electricity capacity using Ford Fulkerson, Edmonds Karp and Goldberg Tarjan algorithm / Nik Nur Diyana Nik Mohd Huzaidi
Published 2024“…The main goals are to study these algorithms for maximum electricity flow, implement them to find the best flow in electricity transmission, and optimize the flow using these methods. …”
Get full text
Get full text
Thesis -
15
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
16
Optimal power flow using the Jaya algorithm
Published 2016“…This paper presents application of a new effective metaheuristic optimization method namely, the Jaya algorithm to deal with different optimum power flow (OPF) problems. …”
Get full text
Get full text
Get full text
Article -
17
Optimal placement and sizing of FACTS devices for optimal power flow using metaheuristic optimizers
Published 2022“…Thus, seven metaheuristic algorithms: Barnacles Mating Optimizer (BMO), Marine Predators Algorithm (MPA), Moth–Flame Optimization (MFO), Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA), Teaching–Learning-Based Optimization (TLBO) and Heap-Based Optimizer (HBO) are used to solve two objective functions: power loss and cost minimizations. …”
Get full text
Get full text
Get full text
Article -
18
Optimal power flow incorporating stochastic wind and solar generation by metaheuristic optimizers
Published 2021“…In this paper, recent metaheuristic algorithms namely Grasshopper Optimization Algorithm (GOA), Black Widow Optimization Algorithm, Grey Wolves Optimizer, Ant Lion Optimizer, Particles Swarm Optimization, Gravitational Search Algorithm, Moth-Flame Optimization and Barnacles Mating Optimizer (BMO) will be used to solve three objective functions of OPF problem viz. (1) cost minimization of the power generation that consists of thermal, stochastic wind and solar power generations, (2) power loss minimization, and (3) combined cost and emission minimization of power generations. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Optimal power flow solutions for power system operations using moth-flame optimization algorithm
Published 2021“…Optimal reactive power dispatch (ORPD) is a sub-problem of optimal power flow. …”
Get full text
Get full text
Thesis -
20
Modeling and optimization of cost-based hybrid flow shop scheduling problem using metaheuristics
Published 2023“…Besides this, CPU time for PSO was very high compared to other algorithms. In the future, other optimization algorithms will be tested for the CHFS model, such as Teaching Learning Based Optimization (TLBO) and the Crayfish Optimization Algorithm (COA).…”
Get full text
Get full text
Get full text
Article
