Search Results - (( using optimization methods algorithm ) OR ( data protection using algorithm ))
Search alternatives:
- optimization methods »
- methods algorithm »
- protection using »
- using algorithm »
-
1
Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms
Published 2023Conference Paper -
2
Optimal overcurrent relay coordination in wind farm using genetic algorithm
Published 2015“…Many suggestions have been made and approaches implemented, however one of the most prominent methods is the use of Genetic Algorithm (GA) to improve the function and coordination of OCRs. …”
Get full text
Get full text
Thesis -
3
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
Get full text
Get full text
Conference or Workshop Item -
4
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…In future work, the algorithm can still be optimized to offer better performance. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
6
Differential Evolution Based Special Protection and Control Scheme for Contingency Monitoring of Transmission Line Overloading
Published 2017“…IEEE 30-bus test system was used to verify the effectiveness of the implemented methods.…”
Get full text
Get full text
Get full text
Book Section -
7
Machine learning in botda fibre sensor for distributed temperature measurement
Published 2023“…Therefore, this thesis explores the comparative analysis for BOTDA data processing using the six most suited machine learning algorithms. …”
text::Thesis -
8
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…The emergence of Deep Learning (DL) models allow more training possibilities and improvement in performance. DL models often use gradient descent optimization, i.e., the Back-Propagation (BP) algorithm; therefore, their training and optimization procedures suffer from local sub-optimal solutions. …”
Get full text
Get full text
Get full text
Article -
9
Hybrid optimisation electromagnetic interference shielding effectiveness:mechanical and physical performance of plaster mortar containing palm oil fuel ash using taguchi grey and t...
Published 2019“…Six factors namely POFA admixture percentage, topcoat powder /binder ratio (TP/B), water/binder ratio (W/B), latex agent content (LA), the particle size of POFA and curing condition are used to control the nine responses. Pre-experiment data is optimized based on Taguchi-grey and Flower Pollination Algorithm (FPA) methods. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…Both radix-2 and radix-4 FNT modules are implemented and a further design of radix-4 FNT module, named radix-4 CTFNT module that is optimized to fit the multiplication algorithm we used is proposed. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
-
13
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Furthermore, to evaluate the efficiency of the proposed modified differential evolution for the training of ridgelet probabilistic neural network, four statistical search techniques, namely, particle swarm optimization, genetic algorithm, simulated angling, and classical differential evolution are used and their results are compared. …”
Get full text
Get full text
Thesis -
14
SVM, ANN, and PSF modelling approaches for prediction of iron dust minimum ignition temperature (MIT) based on the synergistic effect of dispersion pressure and concentration
Published 2021“…Therefore, in this study, the predictability comparisons have been made with the different machine learning methods used to model the MIT for iron dust. The MIT of iron dust was determined using the Godbert-Greenwald furnace for seventy unique combinations of dispersion pressures and dust concentrations. …”
Get full text
Get full text
Article -
15
Geographical information system (GIS) based planning technique for forest road network access : case study in Ayer Hitam Forest Reserve
Published 2016“…For this study, Network Analysis method was used by using Cost Back Link Tool in GIS. …”
Get full text
Get full text
Project Paper Report -
16
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…The study aims to enhance image steganography techniques by using reversible color transformations and optimal area selection within image mosaics to resist statistical attacks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Robust estimation methods for fixed effect panel data model having block-concentrated outliers
Published 2019“…The Ordinary Least Squares (OLS) is the commonly used method to estimate the parameters of fixed effect panel data model. …”
Get full text
Get full text
Thesis -
18
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
19
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…This standard uses AESXTS as a building block for the protection of data. …”
Get full text
Get full text
Thesis -
20
Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran
Published 2015“…A new optimization approach was proposed for redesign monitoring network wells using optimization algorithm based on the vulnerability of aquifer to contaminations, estimation error of sampling wells, nearest distance between wells, and source of contamination in the study area. …”
Get full text
Get full text
Thesis
