Search Results - ((((evolution algorithm) OR (conversion algorithm))) OR (encryption algorithm))
Search alternatives:
- conversion algorithm »
- evolution algorithm »
-
1
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…However, computer networks have a lot of vulnerabilities and threats. Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
2
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…The process of securing the text is by using the 3Dimensional-Advanced Encryption Standard (3D-AES) block cipher algorithm. …”
Get full text
Get full text
Student Project -
3
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…Now, sensitive data can be safely transmitted via the network thanks to the Cryptography Algorithm's usage of encryption to safeguard data. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
4
Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time
Published 2021“…This paper propose a Secured Modified Advanced Encryption Standard Algorithm with decreasing the rounds of Advanced Encryption Standard (AES) to 14 rounds in order to minimize encryption and decryption process time and increasing digital data security as well. …”
Get full text
Get full text
Get full text
Article -
5
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
-
7
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Hence, thoughtfully chosen and practically tested encryption algorithm must be performed to enhance the device efficiency and decrease the risk of sensitive data exposure. …”
Get full text
Get full text
Article -
8
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
9
Differential evolution optimization algorithm based on generation systems reliability assessment integrated with wind energy
Published 2019“…This stuffy proposed a novel optimization method labeled the "Differential Evolution Optimization Algorithm" (DEOA) to assess the reliability of power generation systems (PGS). …”
Get full text
Get full text
Conference or Workshop Item -
10
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
A novel approach to signal encryption: improved version of conventional DSSS scheme
Published 2011“…This arbitrary weight can be obtained from DIA conversion of pseudo noise sequence. Et is evident that, the encrypted samples are largely deviated than the origin which literally ensures much efficient encryption scheme.…”
Get full text
Get full text
Article -
12
A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme
Published 2011“…This arbitrary weight can be obtained from DIA conversion of pseudo noise sequence. Et is evident that, the encrypted samples are largely deviated than the origin which literally ensures much efficient encryption scheme.…”
Get full text
Get full text
Article -
13
HEPWM using differential evolution technique for three phase voltage source inverter
Published 2016“…This paper presents the implementation of Differential Evolution (DE) algorithm to solve Harmonic Elimination Pulse-Width Modulation (HEPWM) problem. …”
Get full text
Get full text
Get full text
Article -
14
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024Subjects:journal::journal article -
15
DNA approach for password conversion generator
Published 2014“…This paper proposed a technique of cryptography to make the data or information to be more secure during transmission over the internet technology based on the DNA Stenography with the Finite State Machine (Mealy Machine) theory. This proposed algorithm is able to securing the data or information at least 3 levels of combinations for the password conversion.…”
Get full text
Get full text
Conference or Workshop Item -
16
Enhancing Wearable-Based Human Activity Recognition with Binary Nature-Inspired Optimization Algorithms for Feature Selection
Published 2026“…Conversely, for the PAMAP2 dataset, BDE algorithm displays superior feature selection quality and BPSO algorithm maintains competitive performance and adaptability. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Direct Tuning Phase-Shift Angle In Dab Dc-Dc Converter Using Moth Flame Optimization (Mfo) Algorithm
Published 2022“…With aforementioned results, the MFO algorithm have well-functioning in DAB system.…”
Get full text
Get full text
Undergraduates Project Papers -
18
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
Get full text
Get full text
Thesis -
19
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
20
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…AES algorithm shows the highest encrypted data size which is with above 234214 bytes. …”
Get full text
Get full text
Get full text
Get full text
Thesis
