Search Results - (( java simulation optimization algorithm ) OR ( using mean encryption algorithm ))
Search alternatives:
-
1
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…In addition, the hyperparameter tuning problem is considered in this research to improve the developed hybrid model by using the AOA algorithm. Lastly, a new hybrid technique suggests tackling the current image encryption application problem by using the estimated parameters of chaotic systems with an optimization algorithm, the SKF algorithm. …”
Get full text
Get full text
Thesis -
2
Data hiding in medical images using encryption and steganography techniques
Published 2019“…In this paper, for the sender side, the secret text will be encrypted using Advanced Encryption Standard algorithm and embedded into the chosen cover image using Least Significant Bit algorithm for more security. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
4
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
Get full text
Get full text
Thesis -
5
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013“…Encryption and decryption algorithm for secure communication depends on the algorithm while the internal structures of the robustness of the mathematics computation depend on the key it uses. …”
Get full text
Get full text
Conference or Workshop Item -
6
Cryptanalysis in cryptographic algorithm design
Published 2006“…Cryptanalysis deals with the uncovering of encrypted messages without initial knowledge of the key used in the encryption process. …”
Get full text
Conference or Workshop Item -
7
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The Advanced Encryption Standard (AES) algorithm is one on the most common and widely symmetric block cipher algorithm that used for encryption and decryption data nowadays. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Both old and new implementations are used to encrypt and decrypt different sizes and types of files using different generated key sizes. …”
Get full text
Get full text
Thesis -
9
Encrypting text data using elliptic curve cryptography
Published 2018“…Elliptic curve cryptography has been proven to be secure and requires small key sizes in comparison to the well-known and most used cryptographic algorithms. In this study, a new approach is proposed to enhance the performance of the encryption which means eliminating classic mapping techniques. …”
Get full text
Get full text
Thesis -
10
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
11
The performance of the 3DES and Fernet encryption in securing data files
Published 2024“…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
Get full text
Article -
12
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
13
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
14
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
16
The performance of the 3DES and fernet encryption in securing data files
Published 2024“…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
Get full text
Get full text
Get full text
Article -
17
Embedded PC based wireless communication using XTEA
Published 2010“…The Extended Tiny Encryption Algorithm (XTEA) is the chosen encryption method. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption
Published 2021“…To address this issue, we proposed a reinforcement hiding in access policy over Cloud storage by enhancing the Ciphertext Policy Attribute-based Encryption (CP-ABE) algorithm. Besides the encryption process, the reinforced CPABE used logical connective operations to hide the attribute value of data in the access policy. …”
Get full text
Get full text
Article -
19
Image compression and encryption
Published 2003“…Thereafter, the chosen image was compressed and finally, encrypted. In this project, the RC4 encryption algorithm has been used. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…For high security, encryption is one of the methods used to protect data against leakage. …”
Get full text
Get full text
Get full text
Thesis
