Search Results - _ distribution ((((function algorithm) OR (encryption algorithm))) OR (generation algorithm))
Search alternatives:
-
1
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…The current parametric encryption algorithms suffer the unconventional and paranormal attacks. …”
Get full text
Get full text
Proceeding Paper -
2
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
Get full text
Get full text
Thesis -
4
Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm
Published 2017Subjects: “…Distributed generation of electric power…”
Get full text
Get full text
Thesis -
5
-
6
A review of the optimal allocation of distributed generation: Objectives, constraints, methods, and algorithms
Published 2023“…Circuit theory; Energy efficiency; Optimization; Dg siting; Dg sizings; Distributed generators; Distributed resources; Objective functions; Optimal allocation; Optimal DG allocation; Optimization algorithms; Distributed power generation…”
Review -
7
Distributed generation allocation to reduce losses and improve voltage profile genetic algorithm: article
Published 2010“…This paper presents a method for the optimal allocation of Distributed generation in distribution systems. In this paper, the aim would be optimal distributed generation allocation for voltage profile improvement and loss reduction in distribution network. …”
Get full text
Get full text
Article -
8
Chaos-based simultaneous compression and encryption for Hadoop
Published 2017“…In addition, the proposed approach implements a masking pseudorandom keystream that enhances encryption quality. The proposed algorithm demonstrated a congruent fit within the Hadoop framework, providing robust encryption security and compression. © 2017 Usama, Zakaria. …”
Get full text
Get full text
Article -
9
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. …”
Get full text
Get full text
Article -
10
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. …”
Get full text
Get full text
Article -
11
Improved gravitational search algorithm for optimal placement and sizing of distributed generation for power quality enhancement
Published 2017“…Distributed generation (DG) is one of the foremost elements in distribution planning. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
An empirical study of density and distribution functions for ant swarm optimized rough reducts
Published 2011“…Coexistence, cooperation, and individual contribution to food searching by a particle (ant) as a swarm (colony) survival behavior, depict the common characteristics of both PSO and ACO algorithms. Ant colony approach in Ant Swarm algorithm generates local solutions which satisfy the Gaussian distribution for global optimization using PSO algorithm. …”
Get full text
Get full text
Get full text
Book Chapter -
13
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…The test findings prove that the decentralized authentication platform-based blockchain-based IoT (BIoT) device-to-device architecture has a significantly higher throughput than the gateway-based architecture. To encrypt the elliptical curve cryptographic (ECC) and to generate keys, the Chinese remainder theorem (CRT)-based scheme is proposed and compared with the secure hash algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…Since the direct application of the firefly algorithm cannot generate connected topologies, outputs from the firefly algorithm were used as an initial input material distribution for the OC method. …”
Get full text
Get full text
Article -
15
Optimal Location And Sizing Of Distrubuted Generator Using PSO And GA Algorithms In Power Systems
Published 2019“…There are numerous advantages that can be obtained when Distributed Generation (DG) is integrated into the distribution systems. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Firefly analytical hierarchy algorithm for optimal allocation and sizing of distributed generation in radial distribution network
Published 2022“…The simulations of single and multi-objective function optimisations have been carried out using MATLAB for meta-heuristic techniques on the IEEE 33-bus and 69-bus radial distribution networks. …”
Get full text
Get full text
Get full text
Thesis -
17
Optimum Feeder Routing and Distribution Substation Placement and Sizing using PSO and MST
Published 2014“…The results indicate the proposed algorithm has been succeeded to find the reasonable placement and sizing of distributed generation with adequate feeder path.…”
Get full text
Get full text
Article -
18
Optimal multiple distributed generation output through rank evolutionary particle swarm optimization
Published 2015“…The total power losses in a distribution network are usually minimized through the adjustment of the output of a distributed generator (DG). …”
Get full text
Get full text
Get full text
Article -
19
-
20
Levy slime mould algorithm for solving numerical and engineering optimization problems
Published 2022“…The proposed Levy Slime Mould Algorithm (LSMA) is a novel metaheuristic algorithm that integrates the Levy distribution into a new metaheuristic called Slime Mould Algorithm (SMA) for solving numerical and engineering problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
