Search Results - (((evolutionary OR evolution) algorithm) OR (((connection algorithm) OR (encryption algorithm))))
Search alternatives:
- connection algorithm »
-
1
Design of digital circuit structure based on evolutionary algorithm method
Published 2008“…Evolutionary Algorithms (EAs) cover all the applications involving the use of Evolutionary Computation in electronic system design. …”
Get full text
Get full text
Get full text
Article -
2
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Thesis -
3
Evolution strategies for evolving artificial neural networks in an arcade game
Published 2010“…The aim of this paper is to use a simple but powerful evolutionary algorithm called Evolution Strategies (ES) to evolve the connection weights and biases of feed-forward artificial neural networks (ANN) and to examine its learning ability through computational experiments in a non-deterministic and dynamic environment, which is the well-known arcade game called Ms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
Get full text
Get full text
Thesis -
5
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Student Project -
6
Pareto ensembles for evolutionary synthesis of Neurocontrollers in a 2D maze-based video game
Published 2013“…A system using multi-objective evolutionary algorithm is developed, which is called as Pareto Archived Evolution Strategy Neural Network(PAESNet), with the attempt to find a set of Pareto optimal solutions by simultaneously optimizing two conflicting objectives. …”
Get full text
Get full text
Article -
7
Performance comparison analysis of aes-256 sha-256-hmac, aes-256 md5-hmac, 3des sha-256-hmac and 3des-md5-hmac on ipsec vpn using gns3 / Mohd Hilman Lukman
Published 2016“…However performance of encryption needs to be tested as so many encryption algorithms in the market. …”
Get full text
Get full text
Thesis -
8
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Pareto Ensembles for evolutionary Synthesis of Neurocontrollers in a 2D Maze-based video game
Published 2013“…A system using multi-objective evolutionary algorithm is developed, which is called as Pareto Archived Evolution Strategy Neural Network(PAESNet), with the attempt to find a set of Pareto optimal solutions by simultaneously optimizing two conflicting objectives. …”
Get full text
Get full text
Article -
10
-
11
Optimal placement, sizing and power factor of distributed generation: A comprehensive study spanning from the planning stage to the operation stage
Published 2023“…Electric power factor; Electric power transmission networks; Evolutionary algorithms; Optimization; Differential Evolution; Differential evolution algorithms; Distributed generation source; Multiple distributed generations; Optimal allocation; Optimisations; Power factorAbstract; Power system constraints; Distributed power generation; algorithm; distribution system; energy planning; operations technology; optimization…”
Article -
12
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
13
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
Published 2020“…Then, partially homomorphic encryption (PHE) technique - Rivest-Shamir-Adleman (RSA) algorithm was used to encrypt the ECG signal by using the public key. …”
Get full text
Get full text
Get full text
Article -
14
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Conference or Workshop Item -
15
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Get full text
Article -
16
Second Level Password Generator
Published 2010“…The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). …”
Get full text
Get full text
Conference or Workshop Item -
17
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
18
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Thesis -
19
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007“…One type of encryption is 'one-way hashing function' which consists of several algorithms such as Message Digests (MD), Secure Hash Algorithm (SHA) and RIPEMD etc. …”
Get full text
Get full text
Research Reports -
20
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. …”
Get full text
Get full text
Get full text
Article
