Search Results - ((iteration algorithms) OR (((encryption algorithm) OR (detection algorithm))))

Refine Results
  1. 1

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…This project used iterative method to investigate the security algorithm and implemented the algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Enhanced chaotic image encryption algorithm based on Baker's map by Salleh, Mazleena, Ibrahim, Subariah, lsnin, Fauz

    Published 2003
    “…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
    Get full text
    Get full text
    Article
  3. 3

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL by Sharifah Azizah, Wan Alwi

    Published 2022
    “…This security algorithm was examined and put into use in this project using an iterative methodology. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  4. 4

    An improved chaotic image encryption algorithm by Al-Khasawneh, Mahmoud Ahmad, Shamsuddin, Siti Mariyam, M.Kamrul Hasan, Shafaatunnur, Ibrahim, Adamu Abubakar

    Published 2018
    “…Chaotic-based image encryption algorithms are countless in number. Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…An encrypted malicious traffic is able to evade the detection by IDS. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A new public key cryptosystem based on IFS by Mohammed G. Al-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2010
    “…In the proposed public-key encryption algorithm, generate iterated function systems as a global public element, then its Hutchinson operator is used as a public key. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment by Khalifa, Othman Omran, Ahmed, Muhammed Zaharadeen, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…An encrypted malicious traffic is able to evade the detection by IDS. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan by Mohd Amdan, Muhammad Awwab

    Published 2014
    “…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Reconstructing applicable chaotic Baptista-type symmetric cryptosystem by Daud, Muhamad Azlan

    Published 2014
    “…This recommended encryption algorithm also overcomes the flaw in Ariffin’s encryption procedure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Iterative data detection and channel estimation for single-parity check-product coded MIMO wireless communications system by Muladi, Muladi, Fisal, N., Yusof, S. K.

    Published 2005
    “…In iterative data-detection and channel-estimation algorithms, the channel estimator and the data detector recursively exchange the information order to improve the system performance. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Performance of iterative data detection and channel estimation for single-parity check-product coded multiple antenna wireless communications by Muladi, Muladi, Fisal, N., Yusof, S. K.

    Published 2005
    “…In iterative data-detection and channel-estimation algorithms, the channel estimator and the data detector recursively exchange the information order to improve the system performance. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box by Alabaichi, Ashwak Mahmood

    Published 2014
    “…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2018
    “…This problem will be solved by encrypting the signals, using the proposed fully homomorphic encryption (FHE) technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18

    Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL by Shamsiah, Suhaili, Cleopatra Chundang, Niam, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2020
    “…In result, various encryption algorithms coming into being. Cryptographic algorithm has become one of the most essential features of embedded system design. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Recent Efficient Iterative Algorithms on Cognitive Radio Cooperative Spectrum Sensing to Improve Reliability and Performance by Akbari, M., Reza, A.W., Noordin, K.A., Dimyati, K., Manesh, M.R., Hindia, M.N.

    Published 2016
    “…This paper focuses on optimality of analytical study on the common soft decision fusion (SDF) CSS based on different iterative algorithms which confirm low total probability of error and high probability of detection in detail. …”
    Get full text
    Get full text
    Article