Search Results - (( using box method algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- method algorithm »
- java application »
- box method »
-
1
-
2
Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance
Published 2023Article -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
5
Improving the security of LBlock lightweight algorithm using bit permutation
Published 2013“…LBlock uses word permutation to do the diffusion while this research uses bit permutation to increase the number of active Substitution box (S-box). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
7
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
8
The memory-less method of generating multiplicative inverse values for S-box in AES algorithm
Published 2009Get full text
Working Paper -
9
Designing substitution boxes based on chaotic map and globalized firefly algorithm
Published 2019“…For this reason, the research for a new metaheuristic based S-boxes generation is still a useful endeavour. This thesis aim to provide a new design for 8 × 8 S-boxes based on firefly algorithm (FA) optimization. …”
Get full text
Get full text
Thesis -
10
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
11
-
12
Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map
Published 2018“…This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4 ≤ n ≤ 8) based on a recent optimization algorithm known as sine-cosine algorithm (SCA). …”
Get full text
Get full text
Get full text
Article -
13
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
14
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…This paper presents an efficient and secure chaotic-based S-box image encryption scheme. Firstly, a single S-box with a size of 10 × 26 was constructed by using a low-dimensional chaotic system. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
15
High Accuracy Estimation Of Head Yaw Using Bounding Box Algorithm On A Vision Based System
Published 2020“…The percentage of accuracy of the yaw estimation using a bounding box algorithm is 92.4%. In addition, the yaw estimation was also able to identify the turning direction of the head (left or right). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The use of non-linear S-Box is essential in preventing linear approximations that could lead to successful attacks, such as differential cryptanalysis. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
-
20
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph
