The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper focuses on the optimal scheduling of the diesel generators in the oil rig platform for the fuel optimization problem. The Specific Fuel Consumption (SFC) of the Diesel Generator is not properly modeled in the literature. An accurate model of SFC using cubic spline interpolation method is also presented. Optimization of fuel consumption at various loading conditions has been analyzed with...
Cryptographic systems need strings of randomly chosen bits in order to function correctly. The most obvious need is with key generation. A secret key must be un-guessable for it to be secure. If a random number generator (RNG) meets this fundamental requirement an attacker will be forced to try every possible combination of bits for the given key length. Many cryptographic systems have a single subsystem...
With simple architecture and faster speed, linear feedback shift register often is selected to produce random number in many applications. However, the random number generated by LFSR cannot meet the demand of unpredictability for secure mechanism. The nonlinearity of genetic algorithm can be used to improve the property of LFSR. We present a novel random number generator by using genetic algorithm...
This paper presents the application of self adaptation phenomenon in real-coded genetic algorithms (GA) for the solution of economic dispatch (ED) problems, taking into account the nonlinear generator characteristics such as prohibited operating zones and ramp-rate limits. The self adaptation is achieved by means of tournament selection along with simulated binary crossover (SBX). This selection process...
Random number generators represent basic cryptographic primitives. They are widely used in modern security schemes including security protocols, computer security and password sources. In some algorithms (e.g. DSA) or protocols (e.g. zero-knowledge), random numbers are intrinsic to the computation [3]. In all these applications, strength of security depends greatly on the quality of randomness of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.