Search Results - ((((conversion algorithm) OR (encryption algorithm))) OR (evolutionary algorithm))
Search alternatives:
- conversion algorithm »
-
1
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Thesis -
2
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Student Project -
3
-
4
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
5
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…However, computer networks have a lot of vulnerabilities and threats. Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…The process of securing the text is by using the 3Dimensional-Advanced Encryption Standard (3D-AES) block cipher algorithm. …”
Get full text
Get full text
Student Project -
7
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Thesis -
8
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007“…One type of encryption is 'one-way hashing function' which consists of several algorithms such as Message Digests (MD), Secure Hash Algorithm (SHA) and RIPEMD etc. …”
Get full text
Get full text
Research Reports -
9
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…Now, sensitive data can be safely transmitted via the network thanks to the Cryptography Algorithm's usage of encryption to safeguard data. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
-
12
Metric's thresholds for encoding evolutionary computing representation in software engineering problem
Published 2015“…Algorithm was tested to metric selection problem using Genetic Algorithm and the results obtained are promising.…”
Get full text
Get full text
Get full text
Article -
13
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
14
Enhancing solid oxide fuel cell efficiency through advanced model identification using differential evolutionary mutation fennec fox algorithm
Published 2025“…This research introduces a novel approach for optimal SOFC model identification using a differential evolutionary mutation Fennec fox algorithm (DEMFFA). …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
A novel approach to signal encryption: improved version of conventional DSSS scheme
Published 2011“…This arbitrary weight can be obtained from DIA conversion of pseudo noise sequence. Et is evident that, the encrypted samples are largely deviated than the origin which literally ensures much efficient encryption scheme.…”
Get full text
Get full text
Article -
17
A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme
Published 2011“…This arbitrary weight can be obtained from DIA conversion of pseudo noise sequence. Et is evident that, the encrypted samples are largely deviated than the origin which literally ensures much efficient encryption scheme.…”
Get full text
Get full text
Article -
18
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Subjects:Conference paper -
19
Firefly algorithm-based neural network for GCPV system output prediction: article / Nor Syakila Mohd Zainol Abidin
Published 2014“…In the proposed MLFNN, Firefly Algorithm (FA) was employed as the optimizer and search tools of the MLFNN training parameters. …”
Get full text
Get full text
Article -
20
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Thesis
