Search Results - addition _ different (((evolutionary OR evolution) algorithm) OR (encryption algorithm))

Search alternatives:

Refine Results
  1. 1
  2. 2

    Artificial Neural Controller Synthesis in Autonomous Mobile Cognition by Kim On Chin, Jason Teo

    Published 2009
    “…The Pareto-frontier Differential Evolution (PDE) algorithm is utilized to generate the Pareto optimal sets through a 3-layer feed-forward artificial neural network that optimize the conflicting objectives of robot behavior and network complexity, where the two different types of robot behaviors are phototaxis and RF-localization, respectively. …”
    Get full text
    Get full text
    Article
  3. 3

    Artificial Neural Controller Synthesis in Autonomous Mobile Cognition by Chin Kim On, Jason Teo

    Published 2009
    “…The Pareto-frontier Differential Evolution (PDE) algorithm is utilized to generate the Pareto optimal sets through a 3-layer feed-forward artificial neural network that optimize the conflicting objectives of robot behavior and network complexity, where the two different types of robot behaviors are phototaxis and RF-localization, respectively. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…In addition, Triple Data Encryption Standard (3DES) was also simulated as the encryption algorithm to compare the speedup performance with AES encryption.…”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Reusable data-path architecture for encryption-then-authentication on FPGA by Abbas Y.A., Jidin R., Jamil N., Zaba M.R.

    Published 2023
    “…Reuse of resources or identical functions however require controllers that enable sharing of data path that can also has different �rounds� of transforms required for different modes either PHOTON or LED in this case, in addition to controllers for individual algorithm. …”
    Article
  7. 7

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. Permutation and substitution approaches of image encryption were deployed to address the issue of images volume and differing sizes. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A novel clustering based genetic algorithm for route optimization by Aibinu, Abiodun Musa, Salau, Habeeb Bello, Najeeb, Athaur Rahman, Nwohu, Mark Ndubuka, Akachukwu, Chichebe

    Published 2016
    “…Genetic Algorithm (GA), a random universal evolutionary search technique that imitates the principle of biological evolution has been applied in solving various problems in different fields of human endeavor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…However, most of the existing embedding algorithms are incapable of overcoming the adverse effects of the challenges simultaneously. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Evolutionary Fuzzy ARTMAP Neural Networks for Classification of Semiconductor Defects by Zuwairie, Ibrahim, Tan, Shing Chiang, Watada, Junzo, Marzuki, Khalid

    Published 2014
    “…In addition, one of the proposed EANNs incorporates a facility to learn overlapping samples of different classes from the imbalanced data environment. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA by DORE RAJA, ANAND A RAJA

    Published 2004
    “…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. Among these new algorithms is Twofish. Twofish is a promising 128-bit block which was one of the 5 finalists in the National Institute of Standards and Technology organized competition as the Advanced Encryption Standard. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis by Arif Mandangan, Muhammad Asyraf Asbullah, Syed Farid Syed Adnan, Mohammad Andri Budiman

    Published 2024
    “…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
    Get full text
    Get full text
    Get full text
    Article