Results (481)
Search Parameters:
Keyword: algorithmAn Analysis of K-means Algorithm Based Network Intrusion Detection System
In this modern age, information technology (IT) plays a role in a number of different fields. And therefore, the role of security is very important to control and assist the flow of activities over the network. Intrusion detection (ID) is a kind of security management system for computers and networks. There are many approaches and…
Read MoreAlgorithms for Technical Integration of Virtual Power Plants into German System Operation
This paper critically evaluates the operational perspective of Virtual Power Plants (VPP) in Germany by analyzing key factors to replace conventional power plants in the future power system. Therefore, its necessity for the secure operation as well as the technical and economic benefits for the German power system are pointed out. The single sections describe…
Read MoreA new color image encryption algorithm based on iterative mixing of color channels and chaos
In this paper, we present a novel secure cryptosystem for direct encryption of color images, based on an iterative mixing spread over three rounds of the R, G and B color channels and three enhanced chaotic maps. Each round includes an affine transformation that uses three invertible matrices of order 2 _ 2; whose parameters…
Read MoreThreshold Multi Split-Row algorithm for decoding irregular LDPC codes
In this work, we propose a new threshold multi split-row algorithm in order to improve the multi split-row algorithm for LDPC irregular codes decoding. We give a complete description of our algorithm as well as its advantages for the LDPC codes. The simulation results over an additive white gaussian channel show that an improvement in…
Read MoreComparison of K-Means and Fuzzy C-Means Algorithms on Simplification of 3D Point Cloud Based on Entropy Estimation
In this article we will present a method simplifying 3D point clouds. This method is based on the Shannon entropy. This technique of simplification is a hybrid technique where we use the notion of clustering and iterative computation. In this paper, our main objective is to apply our method on different clouds of 3D points.…
Read MoreAnalysis of Economic Load Dispatch with a lot of Constraints Using Vortex Search Algorithm
In modern powers systems, one of the most considerable topics is economic load dispatch (ELD). ELD is non-linear problem and it became non-convex and non-smooth problem with some constraints such as valve point loading effect. ELD is very crucial for energy generation and distribution in power systems. For solving ELD problem, a lot of methods…
Read MoreAnalytical and Algorithmic Approaches to Determine the Number of Sensor Nodes for Minimum Power Consumption in LWSNs
A Linear Wireless Sensor Network (LWSN) is a kind of wireless sensor network where the nodes are deployed in a line. Since the sensor nodes are energy restricted, energy efficiency becomes one of the most significant design issues for LWSNs as well as wireless sensor networks. With the proper deployment, the power consumption could be…
Read MoreSolving the SAT problem using Genetic Algorithm
In this paper we propose our genetic algorithm for solving the SAT problem. We introduce various crossover and mutation techniques and then make a comparative analysis between them in order to find out which techniques are the best suited for solving a SAT instance. Before the genetic algorithm is applied to an instance it is…
Read MoreOptimal Rotor Design of Line Start Permanent Magnet Synchronous Motor by Genetic Algorithm
Line start permanent magnet synchronous motor (LSPMSM) is one of the highest efficiency motors due to no rotor copper loss at synchronous speed and self-starting. LSPMSM has torque characteristics of both induction motor IM and Permanent Magnet Synchronous Motor-PMSM. Using Genetic Algorithm (GA) for balancing magnetic cost and for copper loss minimization, the magnetic sizes…
Read MoreA novel algorithm for detecting human circadian rhythms using a thoracic temperature sensor
Circadian rhythms undergo high perturbations due to cancer progression and worsening of metabolic diseases. This paper proposes an original method for detecting such perturbations using a novel thoracic temperature sensor. Such an infrared sensor records the skin temperature every five minutes, although some data might be missing. In this pilot study, five control subjects were…
Read MoreAdapting Model Predictive Control for a PV Station and Evaluating two different MPPT Algorithms P&O and FLC
In this paper first discussion approach will stress out the integration of model predictive control in maximum power point tracking MPPT and as progressing a second approach identified as fuzzy logic controller FLC and perturb & Observe P&O algorithms are analyzed. All are interrelated to MPPT model for a photovoltaic module, PVM, to search for…
Read MoreCollaborative Encryption Algorithm Between Vigenere Cipher, Rotation of Matrix (ROM), and One Time Pad (OTP) Algoritma
Cryptography is still developing today. Classical cryptography is still in great demand for research and development. Some of them are Vigenere Cipher and One Time Pad (OTP) Algorithm. Vigenere Cipher is known as the alphabet table used to encrypt messages. While OTP is often used because it is still difficult to solve. Currently there are…
Read MoreThree-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification
Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext…
Read MoreOptimizing the Decoding Complexity of PEG-Based Methods with an Improved Hybrid Iterative/Gaussian Elimination Decoding Algorithm
This paper focuses on optimizing the decoding complexity of the progressive-edge-growth-based (PEG-based) method for the extended grouping of radio frequency identification (RFID) tags using a hybrid iterative/Gaussian elimination decoding algorithm. To further reduce the decoding time, the hybrid decoding is improved by including an early stopping criterion to avoid unnecessary iterations of iterative decoding for…
Read MoreOptimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters
This paper presents the synthesis of a dynamic space vector modulation for power matrix converters so that it is possible to implement a universal modulator that provides a control algorithm dynamically optimized according to the requirements for the matrix converter.
Read MoreOptimized Multi-focus Image Fusion Using Genetic Algorithm
Optical imaging systems or cameras have a convex lens with limited depth of field. So, multi-focus images are obtained when such systems are used to capture an image of a particular scene. These images are fused to get all-in-focus image. This paper proposes a new simpler method of multi-focus image fusion. Instead of decomposing input…
Read MoreA Comparative Study For Color Systems Used In The DCT-DWT Watermarking Algorithm
This paper presents a comparative study of using different color systems on watermarking algorithms. This comparison aim is to determining the robustness and the stability of the color systems used in the watermarking scheme. The watermarking algorithm that is used in this paper is a hybrid scheme using the Discrete Wavelet Transform (DWT) in the…
Read MoreAn Application of ANN Model with Bayesian Regularization Learning Algorithm for Computing the Operating Frequency of C-Shaped Patch Antennas
In this paper, an application of artificial neural network (ANN) using bayesian regularization (BR) learning algorithm based on multilayer perceptron (MLP) model is presented for computing the operating frequency of C-shaped patch antennas (CPAs) in UHF band. Firstly, the operating frequencies of 144 CPAs having varied dimensions and electrical parameters were simulated by the XFDTD…
Read MoreCIRB-Edge for Secure, Energy-Efficient, and Real-Time Edge Computing
In this work, we present CIRB-Edge, a novel integer compression method designed specifically to overcome the limitations of traditional techniques such as Huffman coding, Delta encoding, and dictionary-based algorithms. These legacy methods often fall short in meeting the stringent requirements of secure, energy-efficient, and real-time edge computing due to their high computational overhead, memory demands,…
Read MoreCooperative Game Theory for Grid Service Pricing: A Utility-Centric Approach
This study presents a novel alternative to traditional Net Energy Metering (NEM) by proposing a set of innovative pricing schemes for solar customers participating in utility-led grid service programs through the aggregation of Distributed Energy Resources (DERs). Grounded in cooperative game theory, the proposed framework facilitates equitable and efficient value allocation among key stakeholders, namely…
Read MoreHardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box
Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…
Read MoreAdvancements in Explainable Artificial Intelligence for Enhanced Transparency and Interpretability across Business Applications
This manuscript offers an in-depth analysis of Explainable Artificial Intelligence (XAI), em- phasizing its crucial role in developing transparent and ethically compliant AI systems. It traces AI’s evolution from basic algorithms to complex systems capable of autonomous de- cisions with self-explanation. The paper distinguishes between explainability—making AI decision processes understandable to humans—and interpretability, which provides…
Read MoreOn Mining Most Popular Packages
In this paper, we will discuss two algorithms to solve the so-called package design problem, by which a set of queries (referred to as a query log) is represented by a collection of bit strings with each indicating the favourite activities or items of customers. For such a query log, we are required to design…
Read MoreDeploying Trusted and Immutable Predictive Models on a Public Blockchain Network
Machine learning-based predictive models often face challenges, particularly biases and a lack of trust in their predictions when deployed by individual agents. Establishing a robust deployment methodology that supports validating the accuracy and fairness of these models is a critical endeavor. In this paper, we introduce a novel approach to deploying predictive models, such as…
Read MoreAn Adaptive Heterogeneous Ensemble Learning Model for Credit Card Fraud Detection
The proliferation of internet economies has given the corporate world manifold advantages to businesses, as they can now incorporate the latest innovations into their operations, thereby enhancing ease of doing business. For instance, financial institutions have leveraged credit card usage on the aforesaid proliferation. However, this exposes clients to cybercrime, as fraudsters always find ways…
Read More
