Abu Zitar, Raed
Abu Zitar, Raed
Scopus Author ID
Now showing 1 - 3 of 3
- PublicationA Review for the Genetic Algorithm and the Red Deer Algorithm Applications(2021)The Red Deer algorithm (RD), a contemporary population-based meta heuristic algorithm, applications are thoroughly examined in this paper. The RD algorithm blends evolutionary algorithms' survival of the fittest premise with the productivity and richness of heuristic search approaches. On the other a well-known and relatively older evolutionary based algorithm called the Genetic Algorithm applications are also shown. The contemporary algorithm; the RDA, and the older algorithm; the GA have wide applications in computer science and engineering. This paper sheds the light on all those applications and enable researchers to exploit the possibilities of adapting them in any applications they may have either in engineering, computer science, or business.
- PublicationA Review of the Genetic Algorithm and JAYA Algorithm Applications(2022)This study throws the light on two metaheuristic algorithms and enable researchers to leverage the potential of adapting them in whatever applications they may have either in engineering, computer science, or business. The two algorithms are the GA and the JAYA. The JAYA algorithm is a modern population-based meta heuristic algorithm, its applications are presented in this work. The JA Y A algorithm integrates evolutionary algorithms' survival of the fittest concept with the productivity and richness of heuristic search methodologies. On the other a well-known and somewhat older evolutionary based method called the Genetic Algorithm with applications is also presented here. The recent two algorithms; the JA Y A and the GA have broad comparable applications in computer science and engineering applications.
- PublicationEncryption technique based on chaotic neural network space shift and color‑theory‑induced distortion(2022)
;Al-Muhammed, Muhammed J.Protecting information privacy is likely to promote trust in the digital world and increase its use. This trust may go a long way toward motivating a wider use of networks and the internet, making the vision of the semantic web and Internet of Things a reality. Many encryption techniques that purport to protect information against known attacks are available. However, since the security challenges are ever-growing, devising effective techniques that counter the emerging challenges seems a rational response to these challenges. This paper proffers an encryption technique with a unique computational model that inspires ideas from color theory and chaotic systems. This mix offers a novel computation model with effective operations that (1) highly confuse plaintext and (2) generate key-based enormously complicated codes to hide the resulting ciphertext. Experiments with the prototype implementation showed that the proposed technique is effective (passed rigorous NIST/ENT security tests) and fast. 66 37