Search Results - (( using model encryption algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- model encryption »
- java simulation »
- using model »
-
1
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Then, this study aims to optimize the hyperparameters of the developed DNN model using the Arithmetic Optimization Algorithm (AOA) and, lastly, to evaluate the performance of the newly proposed deep learning model with Simulated Kalman Filter (SKF) algorithm in solving image encryption application. …”
Get full text
Get full text
Thesis -
2
A DNA-dynamic permutation-diffusion algorithm for image encryption using scaling chaotification models and advanced DNA operations
Published 2025“…To evaluate the proposed algorithm, extensive experiments have been conducted, and results have been compared with the latest encryption algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
Get full text
Get full text
Thesis -
4
Enhancing Cryptographic Resilience through Symmetric Encryption Algorithm Utilizing Variable Length Chromosomes Genetic Algorithm
Published 2026journal::journal article -
5
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
Get full text
Get full text
Thesis -
6
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
7
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
8
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…It is implemented using Verilog HDL software and simulated using the ModelSim software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…On the other hand, encrypted exchanges between users are widely used to ensure data security. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Design and Implementation of Advanced Encryption Standard Using Verilog HDL
Published 2020“…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Design and implementation of advanced encryption standard using verilog HDL
Published 2022“…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
13
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
16
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
17
-
18
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…It is implemented using Verilog HDL software and simulated using the ModelSim software. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
19
A chaotic neural network based encryption algorithm for MPEG-2 encoded video signal
Published 2012Get full text
Working Paper -
20
Speed Efficient Hardware Implementation Of Advanced Encryption Standard (Aes)
Published 2017“…In this thesis, the focus is to leverage existing, commonly used cryptography algorithm which is the Advanced Encryption Standard (AES) and improve its speed performance. …”
Get full text
Get full text
Thesis
