Search Results - (( program implementation encryption algorithm ) OR ( parameter optimisation based algorithm ))
Search alternatives:
- implementation encryption »
- program implementation »
- parameter optimisation »
- optimisation based »
-
1
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…The results from this research have proved that the AES is very effective in terms of time taken to encrypt and decrypt documents, strength of the algorithm and the reliability of the program. …”
Get full text
Get full text
Thesis -
2
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
3
Encryption using FPGA
Published 2008“…The AES algorithm is a block cipher that can encrypt and decrypt digital information. …”
Get full text
Get full text
Undergraduates Project Papers -
4
CHAOS BASED BLOCK ENCRYPTOR
Published 2008“…For this project, the studies focus on Advanced Encryption Standard (AES) and H-CES (Hybrid Chaotic Encryption Scheme) algorithms which are to be used in order to implement this project. …”
Get full text
Get full text
Final Year Project -
5
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013Get full text
Get full text
Student Project -
6
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
8
Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm
Published 2018“…Optimisation is difficult to optimise as there are three parameters that need to be tuned, Kp, Integral parameter, Ki, and derivative parameter, Kd. …”
Get full text
Get full text
Monograph -
9
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
11
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…Using less power, the proposed architecture is implemented based on python programming language, thereby improving time and power requirements compared to the traditional algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Analysis of Rabin-p and HIME(R) encryption scheme on IoT platform
Published 2020“…The algorithm of Rabin-p tested by utilizing the C-programming and implemented on a microprocessor system namely Raspberry Pi 3 model B. …”
Get full text
Get full text
Get full text
Article -
13
Mixed-variable ant colony optimisation algorithm for feature subset selection and tuning support vector machine parameter
Published 2017“…This paper presents a hybrid classification algorithm, ACOMV-SVM which is based on ant colony and support vector machine.A new direction for ant colony optimisation is to optimise mixed (discrete and continuous) variables.The optimised variables are then feed into selecting feature subset and tuning its parameters are two main problems of SVM.Most approaches related to tuning support vector machine parameters will discretise the continuous value of the parameters which will give a negative effect on the performance. …”
Get full text
Get full text
Article -
14
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
15
Encryption Technology on Windows Workstation
Published 2004“…The result of this study will be an enhanced version of current encryption technology that is ready to be implemented or applied by interested parties.…”
Get full text
Get full text
Final Year Project -
16
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…This report provides an overview of wireless ad hoc networks, wireless threats, cryptography background and the security algorithms for this encryption method. The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
Get full text
Get full text
Student Project -
17
-
18
-
19
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…Both Design I and Design 2 were written using VHDL, simulated using ALDEC, synthesized using XILINX Synthesizing Tools, implemented using XILINX ISE6.2i implementation tools and download onto the Spartan 2 FPGA board using BEDLOAD utility program. …”
Get full text
Get full text
Final Year Project -
20
Single-Solution Simulated Kalman Filter Algorithm for Global Optimisation Problems
Published 2016“…In comparison, the proposed ssSKF algorithm supersedes the original population-based Simulated Kalman Filter (SKF) algorithm by operating with only a single agent, and having less parameters to be tuned. …”
Get full text
Get full text
Article
