Search Results - different ((((solution algorithm) OR (evolutionary algorithm))) OR (encryption algorithm))
Search alternatives:
-
1
Encryption selection for WLAN IEEE802.11G
Published 2013“…Thus, these different findings have motivated this research. As for the solution, it proposes a mechanism of selecting encryption algorithms, which is able to help users to select the suitable encryption algorithm and encryption protocols for their secured communication in IEEE 802.11g WLAN. …”
Get full text
Get full text
Thesis -
2
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
Get full text
Get full text
Thesis -
3
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…Inspired by evolutionary algorithms, which can iteratively find the nearoptimal solution, different Evolutionary Algorithms (EAs) were designed to optimize the producer output weight of the SRBFNN that corresponds to the embedded logic programming 2Satisfiability representation (SRBFNN2SAT). …”
Get full text
Get full text
Get full text
Article -
4
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Both old and new implementations are used to encrypt and decrypt different sizes and types of files using different generated key sizes. …”
Get full text
Get full text
Thesis -
5
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…Inspired by evolutionary algorithms, which can iteratively find the nearoptimal solution, different Evolutionary Algorithms (EAs) were designed to optimize the producer output weight of the SRBFNN that corresponds to the embedded logic programming 2Satisfiability representation (SRBFNN2SAT). …”
Get full text
Get full text
Get full text
Article -
6
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…Inspired by evolutionary algorithms, which can iteratively find the nearoptimal solution, different Evolutionary Algorithms (EAs) were designed to optimize the producer output weight of the SRBFNN that corresponds to the embedded logic programming 2Satisfiability representation (SRBFNN2SAT). …”
Get full text
Get full text
Get full text
Article -
7
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…Inspired by evolutionary algorithms, which can iteratively find the nearoptimal solution, different Evolutionary Algorithms (EAs) were designed to optimize the producer output weight of the SRBFNN that corresponds to the embedded logic programming 2Satisfiability representation (SRBFNN2SAT). …”
Get full text
Get full text
Get full text
Article -
8
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…Inspired by evolutionary algorithms, which can iteratively find the nearoptimal solution, different Evolutionary Algorithms (EAs) were designed to optimize the producer output weight of the SRBFNN that corresponds to the embedded logic programming 2Satisfiability representation (SRBFNN2SAT). …”
Get full text
Get full text
Get full text
Article -
9
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…Inspired by evolutionary algorithms, which can iteratively find the nearoptimal solution, different Evolutionary Algorithms (EAs) were designed to optimize the producer output weight of the SRBFNN that corresponds to the embedded logic programming 2Satisfiability representation (SRBFNN2SAT). …”
Get full text
Get full text
Get full text
Article -
10
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
Get full text
Get full text
Thesis -
11
Evolutionary mating algorithm
Published 2023“…This paper proposes a new evolutionary algorithm namely Evolutionary Mating Algorithm (EMA) to solve constrained optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
Published 2020“…Then, partially homomorphic encryption (PHE) technique - Rivest-Shamir-Adleman (RSA) algorithm was used to encrypt the ECG signal by using the public key. …”
Get full text
Get full text
Get full text
Article -
13
A comprehensive comparison of evolutionary optimization limited by number of evaluations against time constraints
Published 2016“…Practically allevolutionary optimization studies have focused exclusively on the use of number of fitness evaluations as the constraining factor when comparing different evolutionary algorithms (EAs). This investigation represents the first study which empirically compares EAs based on time-based constraints against number of fitness evaluations. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Maintain optimal configurations for large configurable systems using multi-objective optimization
Published 2022“…In this paper, different multi-objective Evolutionary Algorithms like Non-Dominated Sorting Genetic algorithms II (NSGA-II) and NSGA-III and Indicator based Evolutionary Algorithm (IBEA) are applied to different feature models to generate optimal results for large configurable. …”
Get full text
Get full text
Get full text
Article -
15
Multi-objective optimization of all-wheel drive electric formula vehicle for performance and energy efficiency using evolutionary algorithms
Published 2020“…Results show that the non-dominated sorting genetic algorithm II outperforms the constrained multi-objective evolutionary algorithm based on decomposition by using differential evolution in obtaining a wider distributed Pareto solution and converges at a relatively shorter time frame. …”
Get full text
Get full text
Article -
16
Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game
Published 2015“…The experimental results show that all the algorithms applied were able to generate good solutions for solving the reinforcement issues. …”
Get full text
Get full text
Get full text
Thesis -
17
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…This problem will be solved by encrypting the signals, using the proposed fully homomorphic encryption (FHE) technique. …”
Get full text
Get full text
Conference or Workshop Item -
18
A Systematic Exploration of Mutation Space in a Hybridized Interactive Evolutionary Programming for Mobile Game Programming
Published 2014“…Evolutionary programming is the core Evolutionary Algorithm (EA) used in this study where it is hybridized with Interactive Evolutionary Algorithm (IEA) to generate different rulesets that was played on a custom arcade-type mobile game. …”
Get full text
Get full text
Article -
19
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…One of the progressing works for automated machine learning improvement is the inclusion of evolutionary algorithm such as Genetic Programming. The function of Genetic Programming is to optimize the best combination of solutions from the possible pipelines of machine learning modelling, including selection of algorithms and parameters optimization of the selected algorithm. …”
Get full text
Get full text
Article -
20
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…One of the progressing works for automated machine learning improvement is the inclusion of evolutionary algorithm such as Genetic Programming. The function of Genetic Programming is to optimize the best combination of solutions from the possible pipelines of machine learning modelling, including selection of algorithms and parameters optimization of the selected algorithm. …”
Get full text
Get full text
Article
