Search Results - ((((solution algorithm) OR (encryption algorithm))) OR (evolutionary algorithm))

Refine Results
  1. 1
  2. 2

    Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki by Hamad Zaki, Ahmad Wafiy Hamad Zaki

    Published 2013
    Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
    Get full text
    Get full text
    Student Project
  3. 3

    Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment by Khalifa, Othman Omran, Ahmed, Muhammed Zaharadeen, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    A new image encryption algorithm based on single S-box and dynamic encryption step by Wang, Ji Jun, Tan, Soo Fun

    Published 2021
    “…Under the control of the dynamic encryption step algorithm, it effectively destroys the correlation between the source image’s pixels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Experiment
  8. 8

    Fuzzy optimization with multi-objective evolutionary algorithms: A case study by P., Vasant, F., Jimenez, G., Sanchez

    Published 2007
    “…On the other hand, an ad hoc Pareto-based multi-objective evolutionary algorithm to capture multiple non dominated solutions in a single run of the algorithm is described. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Exploring fruit fly evolutionary algorithm in a university examination timetabling environment by Abdul Rahman, Syariza, Benjamin, Aida Mauziah, Ramli, Razamin, Ku-Mahamud, Ku Ruhana, Omar, Mohd Faizal

    Published 2019
    “…A new evolutionary algorithm namely the Fruit-Fly Optimization Algorithm (FOA) which is based on the behavior of finding food by the fruit fly is used as solution methodology. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Enhancing benchmark optimization with evolutionary random approach: A comparative analysis of modified adaptive bats sonar algorithm (MABSA) by Nor Shuhada, Ibrahim, Nafrizuan, Mat Yahya, Saiful Bahri, Mohamed, Mohd Ismail, Yusof

    Published 2025
    “…Recently, evolutionary algorithms have emerged as powerful tools for solving complex optimization problems across various domains. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…In this research, VoIP security was enhanced via a proposed cryptographic system. The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…The deployment of network security procedures requires the implementation of Cryptographic algorithms. To facilitate this security issue, it is best to define a problem and advice a solution. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Evolutionary mating algorithm by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Mohd Mawardi, Saari, Hamdan, Daniyal, Mirjalili, Seyedali

    Published 2023
    “…This paper proposes a new evolutionary algorithm namely Evolutionary Mating Algorithm (EMA) to solve constrained optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Hybrib NSGA-II optimization for improving the three-term BP network for multiclass classification problems by Ibrahim, Ashraf Osman, Shamsuddin, Siti Mariyam, Qasem, Sultan Noman

    Published 2015
    “…This paper presents a hybrid of the multiobjective evolutionary algorithm to gain a better accuracy of the fi nal solutions.The aim of using the hybrid algorithm is to improve the multiobjective evolutionary algorithm performance in terms of the enhancement of all the individuals in the population and increase the quality of the Pareto optimal solutions.The multiobjective evolutionary algorithm used in this study is a nondominated sorting genetic algorithm-II (NSGA-II) together with its hybrid, the backpropagation algorithm (BP), which is used as a local search algorithm to optimize the accuracy and complexity of the three-term backpropagation (TBP) network. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Hybrid NSGA-II Optimization for Improving the Three-Term BP Network for Multiclass Classification Problems by Ibrahim, Ashraf Osman, Shamsuddin, Siti Mariyam, Qasem, Sultan Noman

    Published 2015
    “…This paper presents a hybrid of the multiobjective evolutionary algorithm to gain a better accuracy of the fi nal solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
    Get full text
    Get full text
    Thesis
  18. 18

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Alzaeemi, Shehab Abdulhabib, Tay, Kim Gaik, Huong, Audrey, Sathasivam, Saratha, Majahar Ali, Majid Khan

    Published 2023
    “…Inspired by evolutionary algorithms, which can iteratively find the nearoptimal solution, different Evolutionary Algorithms (EAs) were designed to optimize the producer output weight of the SRBFNN that corresponds to the embedded logic programming 2Satisfiability representation (SRBFNN2SAT). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Barnacles mating optimizer: an evolutionary algorithm for solving optimization by M. H., Sulaiman, Zuriani, Mustaffa, Mohd Mawardi, Saari, Hamdan, Daniyal, Ismail, Musirin, Mohd Razali, Daud

    Published 2018
    “…Comparisons with other evolutionary algorithms also will be presented in this paper.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    An improved chaotic image encryption algorithm by Al-Khasawneh, Mahmoud Ahmad, Shamsuddin, Siti Mariyam, M.Kamrul Hasan, Shafaatunnur, Ibrahim, Adamu Abubakar

    Published 2018
    “…Chaotic-based image encryption algorithms are countless in number. Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper