Search Results - adoption using different ((encryption algorithm) OR (evolutionary algorithm))*
Search alternatives:
- adoption using »
-
1
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
Get full text
Get full text
Thesis -
2
Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem
Published 2023“…Research works published from the year 2018 to 2022 are identified in terms of problem representation and evolutionary strategies adopted. The mechanisms and strategies used in evolutionary algorithms to address different types of combinatorial optimization problems are discovered. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Evolutionary mating algorithm
Published 2023“…This paper proposes a new evolutionary algorithm namely Evolutionary Mating Algorithm (EMA) to solve constrained optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
5
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
6
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
7
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Most research in the literature used fixed key expansion algorithm for encryption and decryption. …”
Get full text
Get full text
Thesis -
8
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
-
10
Optimal coordination of overcurrent relay protection using evolutionary programming / Noor Shah Rizal Abdul Manap
Published 2018“…Due to the difficulty of existing techniques employing different types of algorithm, the usual optimal coordination of overcurrent relays is generally carried out by heuristic, meta-heuristic optimization methods. …”
Get full text
Get full text
Get full text
Thesis -
11
Hybrid harmony search algorithm for continuous optimization problems
Published 2020“…Harmony Search (HS) algorithm has been extensively adopted in the literature to address optimization problems in many different fields, such as industrial design, civil engineering, electrical and mechanical engineering problems. …”
Get full text
Get full text
Thesis -
12
An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir
Published 2016Get full text
Get full text
Conference or Workshop Item -
13
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
14
-
15
-
16
-
17
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
Published 2021“…These evolutionary-based algorithms are known to be effective in solving optimization problems. …”
Get full text
Get full text
Article -
18
-
19
Computational methods for self-assembly of DNA nanostructures / Ong Hui San
Published 2016“…Several approaches have been adopted including development of an autonomous tool that incorporated evolutionary optimization algorithm in constructing these heterogeneous DNA shapes and the application of heuristic through undirected graph theory as an annotation schema to produce the connectivity maps. …”
Get full text
Get full text
Thesis -
20
Prediction of Alzheimer disease using improved MMSE ensemble regressor based on magnetic resonance images
Published 2015“…Chernoff bound decreases again from 50.2 to 46.3 by using the rank based feature selection algorithm. …”
Get full text
Get full text
Thesis
