Search Results - adoption ((a difference) OR (_ reference)) ((evolutionary algorithm) OR (encryption algorithm))
Search alternatives:
- a difference »
- evolutionary »
-
1
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
Get full text
Get full text
Thesis -
2
Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem
Published 2023“…The evolutionary algorithm has been extensively used to solve a range of combinatorial optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Evolutionary mating algorithm
Published 2023“…This paper proposes a new evolutionary algorithm namely Evolutionary Mating Algorithm (EMA) to solve constrained optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
5
Optimal coordination of overcurrent relay protection using evolutionary programming / Noor Shah Rizal Abdul Manap
Published 2018“…Therefore, this research employed a metaheuristic optimization for Evolutionary Programming (EP) to find the optimum time for optimization overcurrent protection relay in radial distribution system. …”
Get full text
Get full text
Get full text
Thesis -
6
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…In this paper, we design a new selective video encryption based on H.264/AVC and AES. …”
Get full text
Get full text
Get full text
Article -
7
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…In this paper, we design a new selective video encryption based on H.264/AVC and AES. …”
Get full text
Get full text
Get full text
Article -
8
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
9
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Hybrid harmony search algorithm for continuous optimization problems
Published 2020“…Harmony Search (HS) algorithm has been extensively adopted in the literature to address optimization problems in many different fields, such as industrial design, civil engineering, electrical and mechanical engineering problems. …”
Get full text
Get full text
Thesis -
12
An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir
Published 2016Get full text
Get full text
Conference or Workshop Item -
13
-
14
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…This combination provides a secure key management mechanism and data hiding to provide strong encryption and decryption standards. …”
Get full text
Get full text
Thesis -
15
-
16
An interactive C++ programming courseware (SIFOO) / Mazliana Hasnan … [et al.]
Published 2012Get full text
Get full text
Book Section -
17
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…In order to keep information secured while transmission, the system was incorporated with cipher algorithms. The block cipher AES (Advanced Encryption Standard) is used for authentication and key distribution while the stream cipher that is based on the linear feedback shift register (LFSR) is used for confidentiality. …”
Get full text
Get full text
Get full text
Thesis -
18
Potential issues in novel computational research: artificial immune systems
Published 2003“…Recent trends in computational research show the significance of computation-based biological research, for example, bioinformatics and system biology, and biologically inspired computational research, which includes genetic algorithms, artificial neural networks, and evolutionary programming. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
Published 2021“…These evolutionary-based algorithms are known to be effective in solving optimization problems. …”
Get full text
Get full text
Article -
20
