Search Results - (((((evolutionary OR solution) algorithm) OR (detection algorithm))) OR (encryption algorithm))

Search alternatives:

Refine Results
  1. 1
  2. 2

    Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment by Khalifa, Othman Omran, Ahmed, Muhammed Zaharadeen, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2018
    “…This study demonstrates contributions by applying these ideas to two classical problems on the natural algorithm calculation and signal processing.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki by Hamad Zaki, Ahmad Wafiy Hamad Zaki

    Published 2013
    Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
    Get full text
    Get full text
    Student Project
  8. 8

    Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali by Mohd Ali, Nurul Amira

    Published 2020
    “…The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…An encrypted malicious traffic is able to evade the detection by IDS. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…An encrypted malicious traffic is able to evade the detection by IDS. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A new image encryption algorithm based on single S-box and dynamic encryption step by Wang, Ji Jun, Tan, Soo Fun

    Published 2021
    “…Under the control of the dynamic encryption step algorithm, it effectively destroys the correlation between the source image’s pixels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Experiment
  16. 16

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…In this research, VoIP security was enhanced via a proposed cryptographic system. The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…The deployment of network security procedures requires the implementation of Cryptographic algorithms. To facilitate this security issue, it is best to define a problem and advice a solution. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
    Get full text
    Get full text
    Thesis
  20. 20

    An improved chaotic image encryption algorithm by Al-Khasawneh, Mahmoud Ahmad, Shamsuddin, Siti Mariyam, M.Kamrul Hasan, Shafaatunnur, Ibrahim, Adamu Abubakar

    Published 2018
    “…Chaotic-based image encryption algorithms are countless in number. Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper