Search Results - adoption a different ((selection algorithm) OR (encryption algorithm))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An observation of different clustering algorithms and clustering evaluation criteria for a feature selection based on linear discriminant analysis by Tie, K. H., A., Senawi, Chuan, Z. L.

    Published 2022
    “…When the Gaussian mixture distribution algorithm is adopted, none of the criteria can consistently select features with the least number. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  8. 8

    Review of Nature Inspired Metaheuristic Algorithm Selection for Combinatorial t-way Testing by Muazu, A.A., Hashim, A.S., Sarlan, A.

    Published 2022
    “…Thus, we found that all metaheuristics has a simple structure to be adopted in different areas for becoming a more efficient in optimization. …”
    Get full text
    Get full text
    Article
  9. 9

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…This combination provides a secure key management mechanism and data hiding to provide strong encryption and decryption standards. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Zebra optimization algorithm for feature selection by Faizan, Muhammad, Muhammad Arif, Mohamad

    Published 2026
    “…Results show that the ZOA successfully achieved a high selection quality. This leads to increasing the classification accuracy on different datasets. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates by Hussein Fayiz, Mohammad Al-Khatib

    Published 2012
    “…Elliptic Curves Cryptosystem (ECC) has been introduced as a secure and efficient public key algorithm. A number of elliptic curves representations have been presented, such as Standard (Weierstrass), Edwards, Binary Edwards, Montgomery curves, and others. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission by Bhattacharjee, S., Rahim, L.B.A., Watada, J., Roy, A.

    Published 2020
    “…It increases confidentiality and offers a backup for accidental data loss by combining the simplified data encryption standard (SDES) and an advanced pattern generation technique that uses a unique pattern generation table. …”
    Get full text
    Get full text
    Article
  13. 13

    Multiview Laplacian semisupervised feature selection by leveraging shared knowledge among multiple tasks by Krishnasamy, Ganesh, Paramesran, Raveendran

    Published 2019
    “…Experiment results on several multimedia applications have shown that the proposed algorithm is competitive compared with the other single-view feature selection algorithms.…”
    Get full text
    Get full text
    Article
  14. 14

    An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion by Haque, Ariful

    Published 2018
    “…The algorithms are used to generate test cases for nine different Boolean expressions of different size and complexities. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction by Nasser, Abdullah, H.M. Ghanem, Waheed Ali, H.Y. Saad, Abdul-Malik, Hamed Abdul-Qawy, Antar Shaddad, A. Ghaleb, Sanaa A, Mohammed Alduais, Nayef Abdulwahab, Din, Fakhrud, Ghetas, Mohamed

    Published 2024
    “…To address these challenges, this research introduces a novel Depth Linear Discrimination-Oriented Feature Selection Method based on Adaptive Sine Cosine Algorithm, named Depth Adaptive Sine Cosine Feature Selection (DASC-FS). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Design Of Perturbative Hyper-Heuristics For Combinatorial Optimisation by Choong, Shin Siang

    Published 2019
    “…Hyper-heuristic automates the selection of LLHs through a high-level heuristic that consists of two key components, i.e. a heuristic selection method and a move acceptance method. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The second algorithm reduces the quantity of interest regions by using the Extremal Region Selection (ERS) algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System by Ismail, F. B., Al-Kayiem, Hussain H.

    Published 2010
    “…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. The BFGS quasi-Newton (TRAINBFG) and Levenberg-Marquart (TRAINLV) have been adopted as training algorithms of the neural network model. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…KDD99, which is a benchmark dataset used for anomaly detection, has been adopted here. …”
    Get full text
    Get full text
    Conference or Workshop Item