Search Results - (( java simulation optimization algorithm ) OR ( using linear block algorithm ))
Search alternatives:
- java simulation »
- block algorithm »
-
1
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The design of the s-box is the most crucial part while designing a new block cipher algorithm since it is the only non-linear element of the cipher. …”
Get full text
Get full text
Thesis -
2
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
3
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The significance of block cipher algorithms lies in their versatility and resilience. …”
Get full text
Get full text
Thesis -
4
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
Get full text
Get full text
Get full text
Article -
5
Secure block cipher inspired by the human immune system
Published 2012“…It also measures the diffusion property in linear transformation using branch number in estimating the possible success of differential and linear attacks. …”
Get full text
Get full text
Thesis -
6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
7
Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed
Published 2022“…In conclusion, this proposed block cipher can also be used as a secure algorithm by nations, organisations or stakeholders to improve data protection besides contributing to computer security research as an alternative to other cryptographic algorithms. …”
Get full text
Get full text
Thesis -
8
Approximating Non Linear Higher Order ODEs By A Three Point Block Algorithm
Published 2024journal::journal article -
9
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…After that, critical performance measurements and metrics used in 3D–CA are identified. The module of a KD-3DCA block cipher is designed and algorithms of the new KD-3D-CA block cipher are generated. …”
Get full text
Get full text
Thesis -
10
Codebook excited linear predictive coding
Published 2011“…In standard Codebook Exited Linear Coding (CELP) the encoding method uses random values for excitation vectors. …”
Get full text
Get full text
Get full text
Book Chapter -
11
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
12
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
13
A study on the VLSI partitions: the implementation of Fiduccia-Mattheyses algorithm / Burhanuddin Omar
Published 1997“…To deal with cells of various size , the algorithm progresses by moving one cell at a time between the blocks of the partition while maintaining a desired based on the size of the blocks rather than the number of cells per block. …”
Get full text
Get full text
Thesis -
14
Security analysis of blowfish algorithm
Published 2013“…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. …”
Get full text
Get full text
Conference or Workshop Item -
15
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
Get full text
Get full text
Thesis -
16
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
17
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
18
-
19
Parallel block backward differentiation formulas for solving ordinary differential equations.
Published 2008“…Most common methods for solving stiff systems of ODEs are based on implicit formulae and solved using Newton iteration which requires repeated solution of systems of linear equations with coefficient matrix, I -hβJ . …”
Get full text
Article -
20
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis
