Search Results - different ((((function algorithm) OR (evolutionary algorithm))) OR (encryption algorithm))
Search alternatives:
-
1
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
2
A shift column different offset for better Rijndael security
Published 2009“…This paper proposes a transformation function to be added to the Rijndael algorithm. It is called a ColumnShift() with different offset values that is added to the currently four transformation functions. …”
Get full text
Get full text
Get full text
Article -
3
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
4
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
5
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
6
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
7
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
8
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis -
9
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
Get full text
Get full text
Thesis -
10
Evaluation of fast evolutionary programming, firefly algorithm and mutate-cuckoo search algorithm in single-objective optimization / Muhammad Zakyizzuddin Rosselan, Shahril Irwan S...
Published 2016“…In this paper, four different benchmark functions were used to compare the optimization performance of these three algorithms. …”
Get full text
Get full text
Get full text
Article -
11
Reusable data-path architecture for encryption-then-authentication on FPGA
Published 2023“…Reuse of resources or identical functions however require controllers that enable sharing of data path that can also has different �rounds� of transforms required for different modes either PHOTON or LED in this case, in addition to controllers for individual algorithm. …”
Article -
12
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
Get full text
Get full text
Thesis -
13
Evolutionary mating algorithm
Published 2023“…This paper proposes a new evolutionary algorithm namely Evolutionary Mating Algorithm (EMA) to solve constrained optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Hybrid evolutionary optimization algorithms: A case study in manufacturing industry
Published 2014“…This membership function is applied for its useful performance through industrial production problems by employing hybrid evolutionary optimization algorithms. …”
Get full text
Get full text
Book -
15
Partial encryption of compressed images employing FPGA
Published 2005“…The compression algorithm decomposes images into several different parts. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
IoT data encryption algorithm for security
Published 2020Get full text
Get full text
Get full text
Get full text
Thesis -
17
Multiobjective evolutionary algorithms NSGA-II and NSGA-III for software product lines testing optimization
Published 2020“…This research, reports on the performance of a multi-objective Evolutionary Algorithms Non-Dominated Sorting Genetic Algorithm II (NSGA-II) and NSGA-III on Feature Models (FMs) to optimize SPL testing.…”
Get full text
Get full text
Get full text
Proceeding Paper -
18
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. Among these new algorithms is Twofish. Twofish is a promising 128-bit block which was one of the 5 finalists in the National Institute of Standards and Technology organized competition as the Advanced Encryption Standard. …”
Get full text
Get full text
Final Year Project -
19
Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar
Published 2019“…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. This research tries to approximate the root for ten difference function of trigonometric, polynomial, exponential and logarithmic function using five difference bracketing method which are bisection, n-section, improved n-section, newton and bisection newton like algorithm. …”
Get full text
Get full text
Thesis -
20
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Secondly, a new DE algorithm (ARDE-SPX) is introduced that automatically adapts a repository of DE strategies and parameters control schemes to avoid the problems of stagnation and make DE respond to a wide range of function characteristics at different stages of evolutionary search. …”
Get full text
Get full text
Thesis
