Search Results - based location differences ((encryption algorithm) OR (evolutionary algorithm))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    A novel secret key generation based on image link by Sulaiman A.H., Al-Shaikhli I.F.T., Wahiddin M.R., Houri S., Jamil N., Ismail A.F.

    Published 2023
    “…One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. …”
    Article
  6. 6

    A novel secret key generation based on image link by Sulaiman, Alyaa Ghanim, Taha Alshaikhli, Imad Fakhri, Wahiddin, Mohamed Ridza, Houri, S, Jamil, Norziana, Ismail, Ahmad Fadzil

    Published 2018
    “…One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Optimization of multipurpose reservoir operation using evolutionary algorithms / Mohammed Heydari by Mohammed , Heydari

    Published 2017
    “…The described model was resolved by linear programming and evolutionary algorithms in Microsoft Excel (Solver). …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A trade-off criterion for bi-objective problem in solving hybrid flow shop scheduling with energy efficient (EE-HFS) using multi-objective dragonfly algorithm (MODA) by Muhammad Ammar, Nik Mu’tasim, Mohd Fadzil Faisae, Ab Rashid

    Published 2024
    “…The MODA outperformed other algorithms based on the convergence metric and was on par with different algorithms for spacing and maximum spread metrics optimization results. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…While the result of FFT algorithm summarizes that the number of the common FFT peak location index for sensors on the same subject is significantly higher compared to the number of common feature for sensors on different subjects.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis