Search Results - (( developing effective key algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…Using brute force techniques, it is possible, in theory, to decipher any key if one has sufficient processing capacity. In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Hybrid multiobjective genetic algorithm for integrated dynamic scheduling and routing of jobs and automated guided vehicles in flexible manufacturing systems by Umar, Umar Ali

    Published 2014
    “…Parameterized uniform crossover (PUX) and migration are used as genetic operators for sub-chromosomes represented using random-key based encoding. Computational experiments were conducted on the developed algorithm coded in Matlab to test the effectiveness of the algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…Hence, it is necessary to research and develop a secure symmetric cipher algorithm. Since the declaration of Rijndael as AES this cipher has been the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking advantage of the rapid development in computing capabilities. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Proposed method for enhancing quantum bit error rate using quantum key distribution technique by Abubakar, M.Y., Jung, L.T., Zakaria, N.M., Foong, O.M.

    Published 2014
    “…In addition also to develop an algorithm for integrating pki and qkd in solving the secrete key sharing issues in grid environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Development of cell formation algorithm and model for cellular manufacturing system by Nouri, Hossein

    Published 2011
    “…The performance of the proposed algorithm is compared with a number of key algorithms that reported in the corresponding scientific literature. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…The proposed method obtained an average entropy of 7.9398 with key space of 1.17x1077 and an average avalanche effect (%) of 49.9823 confirming the security and resilience of the developed method.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…However, the fixed key expansion is vulnerable to square attack. On the other hand, the round key expansion algorithms are relatively simple. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Advancements in crop water modelling: algorithmic developments and parameter optimization strategies for sustainable agriculture: a review by Sulaiman, Ahmad S. S., Wayayok, Aimrun, Aziz, Samsuzana A., Yun, Wong Mui, Leifeng, Guo

    Published 2024
    “…The review concludes with a discussion on the key findings and future directions in algorithm development and optimization for crop water modelling. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Statistical selection algorithm for peer-to-peer system by Othman, Mohamed, Kweh, Yeah Lun

    Published 2008
    “…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Three-dimensional coverage control for multi-unmanned aerial vehicle by Siow, Wen Hao

    Published 2024
    “…This study proposes a 3D coverage control algorithm to address complex real-world scenarios, wherein the 3D control algorithm will be developed based on the 2D MBC scheme. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16
  17. 17

    Optimizing capacitated electric vehicle route in logistic operations by Tiong, Samuel Fu Wei

    Published 2024
    “…The results demonstrated that the optimized algorithm effectively minimized the distance traveled by CEVs while meeting operational constraints. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18
  19. 19

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
    Get full text
    Get full text
    Thesis