Search Results - different ((((evolutionary algorithm) OR (encryption algorithm))) OR (solutionary algorithm))

Search alternatives:

Refine Results
  1. 1

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Performance evaluation for different data encryption algorithms on wireless sensor network (WSN) by Mhawesh, Thoalfekarali Zuhair

    Published 2018
    “…Then the results are compared to the average energy dissipation (μJ) by applying different encryption data, AES, SF and SIT algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A shift column different offset for better Rijndael security by Mahmod, Ramlan, Ali, Sherif Abdulbari, Abd Ghani, Abdul Azim

    Published 2009
    “…Rijndael, currently the Advanced Encryption Standard Algorithms (AES) is a block cipher uses a 128, 192, or 256-bit key length to encrypt 128-bit blocks of plaintext. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Towards Software Product Lines Optimization Using Evolutionary Algorithms by Jamil, Muhammad Abid, K Nour, Mohamed, Alhindi, Ahmed Hasan, Awang Abu Bakar, Normi Sham, Arif, Muhammad, Muhammad Aljabri, Tareq

    Published 2019
    “…We report on the problem encoding, variation operators and different types of algorithms: Indicator Based Evolutionary Algorithm (IBEA), Non-Dominated Sorting Genetic Algorithm II (NSGA-II), Multi-Objective Evolutionary Algorithms based on Decomposition (MOEA/D) and Strength Pareto Evolutionary algorithm II (SPEA-II). …”
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem by Anniza, Hamdan, San Nah, Sze, Say Leng, Goh, Kang Leng, Chiew, Wei King, Tiong

    Published 2023
    “…Two main aspects are used to classify the evolutionary algorithm variants: population-based and evolutionary strategies (variation and replacement). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…This research hopes to give a clear idea to the readers about ABS algorithm. Further research about this topic is recommended to increase the efficiency of ABS algorithm implemented in communication field, so that more different types of field can be encrypted and decrypted instead of plaintext.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…XTS mode of operation will be evaluated in terms of performance with different encryption algorithms such as AES (Advanced Encryption Standard), RC6 (Rivest Cipher version 6), and Twofish. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm by Jati, Grafika, Rachmasari, Ardina Rizqy, Jatmiko, Wisnu, Mursanto, Petrus, Sediono, Wahju

    Published 2017
    “…The experiment result shows that proposed method gives good performance in compression and encryption. Encrypting successfully produced encrypted data that is highly different data compared to original data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Alzaeemi, Shehab Abdulhabib, Tay, Kim Gaik, Huong, Audrey, Sathasivam, Saratha, Majahar Ali, Majid Khan

    Published 2023
    “…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri by Sapri, Nurnadia

    Published 2015
    “…Therefore, the effect of file sizes on encryption and decryption in constrained devices have been analyzed using two types of cryptographic algorithm which is AES-128 (symmetric-key encryption) and RSA- 2048 (asymmetric-key encryption) based on the different file size, execution time, and the throughput. …”
    Get full text
    Get full text
    Thesis