Search Results - ((((evolutionary algorithm) OR (selection algorithm))) OR (encryption algorithm))

Search alternatives:

Refine Results
  1. 1
  2. 2

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…As for the solution, it proposes a mechanism of selecting encryption algorithms, which is able to help users to select the suitable encryption algorithm and encryption protocols for their secured communication in IEEE 802.11g WLAN. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki by Hamad Zaki, Ahmad Wafiy Hamad Zaki

    Published 2013
    Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
    Get full text
    Get full text
    Student Project
  4. 4
  5. 5

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    A Standard Deviation Selection in Evolutionary Algorithm for Grouper Fish Feed Formulation by Soong, Cai Juan, Razamin, Ramli, Rosshairy, Abdul Rahman

    Published 2016
    “…Results shown that the fitness of standard deviation selection in evolutionary algorithm is applicable. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…There are two components in our work. The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Cluster head selection optimization in wireless sensor network via genetic-based evolutionary algorithm by Vincent Chung, Hamzarul Alif Hamzah, Norah Tuah, Kit, Guan Lim, Min, Keng Tan, Kenneth Tze Kin Teo

    Published 2020
    “…Existing approaches for this optimization problem have several drawbacks, including non-adaptive network configuration that may cause premature death of sensor nodes. Genetic-based evolutionary algorithms such as Genetic Algorithm (GA) and Differential Evolution (DE) have been popularly used to optimize cluster head selection in WSN to improve energy efficiency for the extension of network lifetime. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
    Get full text
    Get full text
    Thesis
  11. 11

    A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map by Bahbibi Rahmatullah

    Published 2023
    “…A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map by Bahbibi Rahmatullah…”
    Get full text
    article
  12. 12

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud by Mohd Daud, Mohd Rosli

    Published 2007
    “…One type of encryption is 'one-way hashing function' which consists of several algorithms such as Message Digests (MD), Secure Hash Algorithm (SHA) and RIPEMD etc. …”
    Get full text
    Get full text
    Research Reports
  14. 14

    DNA sequences compression by GP2R and selective encryption using modified RSA technique by Hossein, Syed Mahamud, De, Debashis, Mohapatra, Pradeep Kumar Das, Mondal, Sankar Prasad, Ahmadian, Ali, Ghaemi, Ferial, Senu, Norazak

    Published 2020
    “…Secondly, modified RSA technique is proposed for the selection encryption purpose. This selection encryption of the modified RSA technique is an approach to lessen computational resources for greatly sized DNA facts. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Implementation of Evolutionary Algorithms to Parametric Identification of Gradient Flexible Plate Structure by Annisa, Jamali, Muhammad Hasbollah, Hassan, Lidyana, Roslan, Muhamad Sukri, Hadi

    Published 2023
    “…This paper focused on modelling of a gradient flexible plate system utilizing an evolutionary algorithm, namely particle swarm optimization (PSO) and cuckoo search (CS) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article