Search alternatives:
generation algorithm » detection algorithm (Expand Search)
Showing 21 - 40 results of 44 for search 'code ((((generation algorithm) OR (genetic algorithm))) OR (encryption algorithm))', query time: 0.09s Refine Results
  1. 21
  2. 22
  3. 23

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
  4. 24
  5. 25

    Optimizing overheating, lighting, and heating energy performances in Canadian school for climate change adaptation: Sensitivity analysis and multi-objective optimization methodolog... by Mutasim Baba, Fuad

    Published 2023
    “…This paper aims to develop long-term adaptation strategies for the existing Canadian school buildings under extreme current and future climates using a developed methodology based on global and local sensitivity analysis and Multi-Objective Optimization Genetic Algorithm. The calibrated simulation model based on indoor and outdoor measured temperature for a school of interest is used to evaluate the optimization strategies. …”
    Get full text
    Get full text
    Get full text
  6. 26

    Practical Multiple Node Failure Recovery in Distributed Storage Systems by Itani, M.

    Published 2016
    “…The problem is solved using genetic algorithms that search within the feasible solution space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 27
  8. 28
  9. 29

    Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE by ULLAH, SAAD

    Published 2022
    “…Seasonal thresholds are set for sensor values, and the algorithm detects hazardous trends when values exceed safe limits, correlating them with related sensors to generate combined variables and error codes. …”
    Get full text
  10. 30

    Analysis of power system stability enhancement via excitation and FACTS-based stabilizers by Abido, M. A.

    Published 2004
    “…An eigenvalue-based objective function to increase the system damping and improve the system response is developed. Then, a real-coded genetic algorithm is employed to search for optimal controller parameters. …”
    Get full text
    article
  11. 31

    Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter by Syed Rahman (569240)

    Published 2019
    “…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
  12. 32

    Power system stability enhancement via coordinated design of a PSS and an SVC-based controller by Abido, M.A.

    Published 2003
    “…The coordinated design problem of robust excitation and SVC-based controllers over a wide range of loading conditions and system configurations is formulated as an optimization problem with an eigenvalue-based objective function. The real-coded genetic algorithm (RCGA) is employed to search for optimal controller parameters. …”
    Get full text
    Get full text
    article
  13. 33

    Coordinated design of robust excitation and TCSC-based damping controllers by Abido, M.A.

    Published 2003
    “…The coordinated design problem of robust excitation and TCSC-based controllers over a wide range of loading conditions and system configuration is formulated as an optimization problem with an eigenvalue-based objective function. The real-coded genetic algorithm (RCGA) is employed to search for optimal controller parameters. …”
    Get full text
    Get full text
    article
  14. 34

    Analysis and Assessment of STATCOM-Based Damping Stabilizers for Power System Stability Enhancement by Abido, M. A.

    Published 2005
    “…For coordination purposes, a time domain-based multiobjective junction to improve the system stability as well as ac and dc voltage regulation is proposed. Then, a real-coded genetic algorithm (RCGA) is employed to search for optimal stabilizer parameters. …”
    Get full text
    article
  15. 35

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…We present a range of results for our proposed algorithms in several scenarios to assess the effectiveness of the solution approaches that are shown to generate results close to optimal.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 36

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. …”
  17. 37
  18. 38

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 39

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …”
    Get full text
    Get full text
    Get full text
    article
  20. 40

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed method in this paper is unique in that it converts the mechanical behaviour of shell structures into images that are then used to train a machine learning algorithm. This is achieved by mapping shell deformations and stresses to a set of images that are used to train a conditional generative adversarial network. …”