Search Results - _ distribution ((((function algorithm) OR (encryption algorithm))) OR (generation algorithm))

Refine Results
  1. 1
  2. 2

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    A review of the optimal allocation of distributed generation: Objectives, constraints, methods, and algorithms by Pesaran H.A M., Huy P.D., Ramachandaramurthy V.K.

    Published 2023
    “…Circuit theory; Energy efficiency; Optimization; Dg siting; Dg sizings; Distributed generators; Distributed resources; Objective functions; Optimal allocation; Optimal DG allocation; Optimization algorithms; Distributed power generation…”
    Review
  7. 7

    Distributed generation allocation to reduce losses and improve voltage profile genetic algorithm: article by Abdol Azis, Hazriq Syahmie

    Published 2010
    “…This paper presents a method for the optimal allocation of Distributed generation in distribution systems. In this paper, the aim would be optimal distributed generation allocation for voltage profile improvement and loss reduction in distribution network. …”
    Get full text
    Get full text
    Article
  8. 8

    Chaos-based simultaneous compression and encryption for Hadoop by Usama, M., Zakaria, N.

    Published 2017
    “…In addition, the proposed approach implements a masking pseudorandom keystream that enhances encryption quality. The proposed algorithm demonstrated a congruent fit within the Hadoop framework, providing robust encryption security and compression. © 2017 Usama, Zakaria. …”
    Get full text
    Get full text
    Article
  9. 9

    A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) by Khan, M.A., Ali, A., Jeoti, V., Manzoor, S.

    Published 2018
    “…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. …”
    Get full text
    Get full text
    Article
  10. 10

    A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) by Khan, M.A., Ali, A., Jeoti, V., Manzoor, S.

    Published 2018
    “…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    An empirical study of density and distribution functions for ant swarm optimized rough reducts by Pratiwi, Lustiana, Choo, Yun Huoy, Draman @ Muda, Azah Kamilah

    Published 2011
    “…Coexistence, cooperation, and individual contribution to food searching by a particle (ant) as a swarm (colony) survival behavior, depict the common characteristics of both PSO and ACO algorithms. Ant colony approach in Ant Swarm algorithm generates local solutions which satisfy the Gaussian distribution for global optimization using PSO algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  13. 13

    The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios by Arun Rana, Sharad Sharma, Kashif Nisar, Ag. Asri Ag. Ibrahim, Sachin Dhawan, Bhawani Chowdhry, Samreen Hussain, Nitin Goyal

    Published 2022
    “…The test findings prove that the decentralized authentication platform-based blockchain-based IoT (BIoT) device-to-device architecture has a significantly higher throughput than the gateway-based architecture. To encrypt the elliptical curve cryptographic (ECC) and to generate keys, the Chinese remainder theorem (CRT)-based scheme is proposed and compared with the secure hash algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…Since the direct application of the firefly algorithm cannot generate connected topologies, outputs from the firefly algorithm were used as an initial input material distribution for the OC method. …”
    Get full text
    Get full text
    Article
  15. 15

    Optimal Location And Sizing Of Distrubuted Generator Using PSO And GA Algorithms In Power Systems by Hassan, Ayat Saleh

    Published 2019
    “…There are numerous advantages that can be obtained when Distributed Generation (DG) is integrated into the distribution systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Firefly analytical hierarchy algorithm for optimal allocation and sizing of distributed generation in radial distribution network by Bujal, Noor Ropidah

    Published 2022
    “…The simulations of single and multi-objective function optimisations have been carried out using MATLAB for meta-heuristic techniques on the IEEE 33-bus and 69-bus radial distribution networks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Optimum Feeder Routing and Distribution Substation Placement and Sizing using PSO and MST by Hasan, Ihsan Jabbar, Gan, Chin Kim, Shamshiri, Meysam, Ab Ghani, Mohd Ruddin, Omar, Rosli

    Published 2014
    “…The results indicate the proposed algorithm has been succeeded to find the reasonable placement and sizing of distributed generation with adequate feeder path.…”
    Get full text
    Get full text
    Article
  18. 18

    Optimal multiple distributed generation output through rank evolutionary particle swarm optimization by Jamian, J.J., Mustafa, M.W., Mokhlis, Hazlie

    Published 2015
    “…The total power losses in a distribution network are usually minimized through the adjustment of the output of a distributed generator (DG). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Levy slime mould algorithm for solving numerical and engineering optimization problems by J. J., Jui, M. A., Ahmad, M. I. M., Rashid

    Published 2022
    “…The proposed Levy Slime Mould Algorithm (LSMA) is a novel metaheuristic algorithm that integrates the Levy distribution into a new metaheuristic called Slime Mould Algorithm (SMA) for solving numerical and engineering problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item