Search Results - a distribution ((((function algorithm) OR (encryption algorithm))) OR (connection algorithm))
Search alternatives:
- connection algorithm »
- function algorithm »
- a distribution »
-
1
-
2
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…Since the direct application of the firefly algorithm cannot generate connected topologies, outputs from the firefly algorithm were used as an initial input material distribution for the OC method. …”
Get full text
Get full text
Article -
3
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…The current parametric encryption algorithms suffer the unconventional and paranormal attacks. …”
Get full text
Get full text
Proceeding Paper -
4
Profit-based optimal generation scheduling of a microgrid
Published 2023“…A case study on the difference between grid-connected and islanded operation is presented. …”
Conference paper -
5
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
6
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
Article -
7
-
8
Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability
Published 2024“…A Binary Clonal Selection Algorithm is being proposed to ensure optimal generation of the superior final neuron states. …”
Get full text
Get full text
Thesis -
9
-
10
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is a data encryption technique that exist in the world with as currently the most secured algorithms. …”
Get full text
Get full text
Thesis -
11
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…There are two components in our work. The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Energy management and performance evaluation of grid connected PV-battery hybrid system with inherent control scheme
Published 2018“…For this purpose, a new management algorithm is proposed to optimize the generated power and allows the system to act as a distributed source inside the utility grid. …”
Get full text
Get full text
Article -
13
Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links
Published 2014“…The proposed algorithm is integrated with AODV routing protocol to generate a connected dominating set that will be responsible on flooding activity. …”
Get full text
Get full text
Get full text
Article -
14
Electricity distribution network for low and medium voltages based on evolutionary approach optimization
Published 2015“…The results indicate that proposed algorithm has succeeded in finding a reasonable placement and sizing of distributed generation with adequate feeder path. …”
Get full text
Get full text
Get full text
Thesis -
15
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. …”
Article -
16
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
17
Fusion of linear and nonlinear functional model for cadastral network adjustment / Nazurah Syahzanani Amiruddin
Published 2024“…Consequently, the findings have demonstrated the reliability of a hybrid algorithm as an alternative for cadastral network adjustment. …”
Get full text
Get full text
Student Project -
18
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
19
Selection of access network using cost function method in heterogeneous wireless network
Published 2014“…This method covers the weight distribution and cost factor techniques.The weight distribution is used to measure different weights for existing wireless network based on the user's preference and mobile terminal power.The cost factor technique is also used to identify the cost for performing handover target by considering every network parameters and its weight.Results obtained showed that the algorithm has the ability to increase user's satisfaction compared to other algorithms, which consistently choose one accessible network.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A New Cryptosystem Based on Decimal Numbers and Nonlinear Function
Published 2009Get full text
Get full text
Thesis
