Search Results - addition ((_ different) OR (a difference)) ((encryption algorithm) OR (evolutionary algorithm))

Search alternatives:

Refine Results
  1. 1

    Reusable data-path architecture for encryption-then-authentication on FPGA by Abbas Y.A., Jidin R., Jamil N., Zaba M.R.

    Published 2023
    “…Reuse of resources or identical functions however require controllers that enable sharing of data path that can also has different �rounds� of transforms required for different modes either PHOTON or LED in this case, in addition to controllers for individual algorithm. …”
    Article
  2. 2

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…Those approaches named as, Encryption for Absolute Coefficient Level, Encryption of Intra Prediction Mode, and Encryption of Motion Vector Difference (MVD). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…In addition, Triple Data Encryption Standard (3DES) was also simulated as the encryption algorithm to compare the speedup performance with AES encryption.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…XTS mode of operation will be evaluated in terms of performance with different encryption algorithms such as AES (Advanced Encryption Standard), RC6 (Rivest Cipher version 6), and Twofish. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    The performance of the 3DES and Fernet encryption in securing data files by Mohd, Siti Munirah, Kamarudin, Shafinah, Yahya, Norhanizah, Hasan, Sazlinah, Mahamad Zakaria, Muhammad Luqman, Sulaiman, Sahimel Azwal, Setyohadi, Djoko Budiyanto

    Published 2024
    “…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
    Get full text
    Article
  8. 8
  9. 9

    The performance of the 3DES and fernet encryption in securing data files by Siti Munirah, Mohd, Shafinah, Kamarudin, Norhanizah, Yahya, Sazlinah, Hasan, Muhammad Luqman, Mahamad Zakaria, Sahimel Azwal, Sulaiman, Setyohadi, Djoko Budiyanto

    Published 2024
    “…Therefore, this study aims to implement the symmetric encryption algorithms known as 3DES and Fernet methods as a means for securing files. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Evolutionary Fuzzy ARTMAP Neural Networks for Classification of Semiconductor Defects by Zuwairie, Ibrahim, Tan, Shing Chiang, Watada, Junzo, Marzuki, Khalid

    Published 2014
    “…In addition, one of the proposed EANNs incorporates a facility to learn overlapping samples of different classes from the imbalanced data environment. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Artificial Neural Controller Synthesis in Autonomous Mobile Cognition by Kim On Chin, Jason Teo

    Published 2009
    “…This paper describes a new approach in using multi-objective evolutionary algorithms in evolving the neural network that acts as a controller for the phototaxis and radio frequency localization behaviors of a virtual Khepera robot simulated in a 3D, physics-based environment. …”
    Get full text
    Get full text
    Article
  13. 13

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Artificial Neural Controller Synthesis in Autonomous Mobile Cognition by Chin Kim On, Jason Teo

    Published 2009
    “…This paper describes a new approach in using multi-objective evolutionary algorithms in evolving the neural network that acts as a controller for the phototaxis and radio frequency localization behaviors of a virtual Khepera robot simulated in a 3D, physics-based environment. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA by DORE RAJA, ANAND A RAJA

    Published 2004
    “…Among these new algorithms is Twofish. Twofish is a promising 128-bit block which was one of the 5 finalists in the National Institute of Standards and Technology organized competition as the Advanced Encryption Standard. …”
    Get full text
    Get full text
    Final Year Project
  16. 16
  17. 17

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…This standard uses AESXTS as a building block for the protection of data. For an effective storage encryption implementation, two well known methods are software based encryption and hardware based encryption. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis by Arif Mandangan, Muhammad Asyraf Asbullah, Syed Farid Syed Adnan, Mohammad Andri Budiman

    Published 2024
    “…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis by Mandangan, Arif, Asbullah, Muhammad Asyraf, Adnan, Syed Farid Syed, Budiman, Mohammad Andri

    Published 2024
    “…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Identifying movement of object in multiple images via particle swarm optimization algorithm / Mohd Haidhar Iqbal Hassan by Iqbal Hassan, Mohd Haidhar

    Published 2016
    “…For example, similar to one game and that is a spot the difference of images. When human test this game it maybe take a few minutes to spot the difference from that images and sometimes the result is incorrect. …”
    Get full text
    Get full text
    Student Project