Search Results - (( developing effective key algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- effective key »
- key algorithm »
-
1
-
2
A block cipher based on genetic algorithm
Published 2016“…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
Get full text
Get full text
Get full text
Thesis -
3
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…Using brute force techniques, it is possible, in theory, to decipher any key if one has sufficient processing capacity. In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. …”
Get full text
Get full text
Get full text
Thesis -
4
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
Published 1999Get full text
Get full text
Get full text
Proceeding Paper -
5
Hybrid multiobjective genetic algorithm for integrated dynamic scheduling and routing of jobs and automated guided vehicles in flexible manufacturing systems
Published 2014“…Parameterized uniform crossover (PUX) and migration are used as genetic operators for sub-chromosomes represented using random-key based encoding. Computational experiments were conducted on the developed algorithm coded in Matlab to test the effectiveness of the algorithm. …”
Get full text
Get full text
Thesis -
6
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…Since the key exchange process is successful, we think the offered methods are effective.…”
Get full text
Get full text
Student Project -
7
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…Hence, it is necessary to research and develop a secure symmetric cipher algorithm. Since the declaration of Rijndael as AES this cipher has been the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking advantage of the rapid development in computing capabilities. …”
Get full text
Get full text
Thesis -
8
Proposed method for enhancing quantum bit error rate using quantum key distribution technique
Published 2014“…In addition also to develop an algorithm for integrating pki and qkd in solving the secrete key sharing issues in grid environment. …”
Get full text
Get full text
Conference or Workshop Item -
9
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…The performance of the proposed algorithm is compared with a number of key algorithms that reported in the corresponding scientific literature. …”
Get full text
Get full text
Thesis -
10
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The proposed method obtained an average entropy of 7.9398 with key space of 1.17x1077 and an average avalanche effect (%) of 49.9823 confirming the security and resilience of the developed method.…”
Get full text
Get full text
Get full text
Article -
11
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…However, the fixed key expansion is vulnerable to square attack. On the other hand, the round key expansion algorithms are relatively simple. …”
Get full text
Get full text
Thesis -
12
Advancements in crop water modelling: algorithmic developments and parameter optimization strategies for sustainable agriculture: a review
Published 2024“…The review concludes with a discussion on the key findings and future directions in algorithm development and optimization for crop water modelling. …”
Get full text
Get full text
Get full text
Article -
13
Statistical selection algorithm for peer-to-peer system
Published 2008“…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. …”
Get full text
Get full text
Get full text
Article -
14
Three-dimensional coverage control for multi-unmanned aerial vehicle
Published 2024“…This study proposes a 3D coverage control algorithm to address complex real-world scenarios, wherein the 3D control algorithm will be developed based on the 2D MBC scheme. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Development of an effective clustering algorithm for older fallers
Published 2022Get full text
Get full text
Article -
16
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
17
Optimizing capacitated electric vehicle route in logistic operations
Published 2024“…The results demonstrated that the optimized algorithm effectively minimized the distance traveled by CEVs while meeting operational constraints. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
20
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
Get full text
Get full text
Thesis
