Search Results - different ((optimisation algorithm) OR (((evolution algorithm) OR (encryption algorithm))))
Search alternatives:
- optimisation algorithm »
- evolution algorithm »
-
1
Differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…This paper looks at the feasibility of using the differential evolution algorithm to estimate the linear frequency modulation received signal parameters for radar signal denoising. …”
Get full text
Get full text
Conference or Workshop Item -
2
Sensitivity analysis of GA parameters for ECED problem
Published 2023“…Besides the conventional method by using the Lagrange Multiplier several evolutionary computation techniques such as Genetic Algorithm, Particle Swarm Optimisation, Ant Colony and Differential Evolution have been gaining popularity in solving general economic dispatch problems due to their desirable characteristics such as non-gradient dependent and ability to search for global optima. …”
Conference paper -
3
Varying Variants For AncDE With MDV Between Target And Trial Vector Measurement
Published 2018“…This paper compares standard Differential Evolution algorithm with AncDE,which adds a separate cache of recent ancestors that serve as an additional source of highquality genetic information.We compare the solutions produced by both DE and AncDE algorithms using benchmarks of 15 different numeric optimisation problems.Two distinct explorations are presented.The first test is distinct algorithmic variants of AncDE.The second part of this paper defines an MDV attribute and results are presented indicating some interesting differences in MDV between the DE and AncDE algorithms.Our findings indicate that ancestors can help to overcome some of the local variations in solutions quality and improve solution quality by improving population diversity.…”
Get full text
Get full text
Get full text
Get full text
Article -
4
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
5
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
6
B-spline curve fitting with different parameterization methods
Published 2020“…After generating control points, distance between the generated and original data points is used to identify the error of the algorithm. Later, genetic algorithm and differential evolution optimization are used to optimise the error of the curve. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…Then the results are compared to the average energy dissipation (μJ) by applying different encryption data, AES, SF and SIT algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
11
Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali
Published 2019“…Proposed algorithm AES, has a different key sizes ,as 128,192 and 256. …”
Get full text
Get full text
Thesis -
12
A shift column different offset for better Rijndael security
Published 2009“…Rijndael, currently the Advanced Encryption Standard Algorithms (AES) is a block cipher uses a 128, 192, or 256-bit key length to encrypt 128-bit blocks of plaintext. …”
Get full text
Get full text
Get full text
Article -
13
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis -
14
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods
Published 2017“…This study sought to examine the performance of three newly proposed techniques, for reliability assessment of the power systems, namely Disparity Evolution Genetic Algorithm (DEGA), Binary Particle Swarm Optimisation (BPSO), and Differential Evolution Optimization Algorithm (DEOA). …”
Get full text
Get full text
Get full text
Thesis -
16
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
Get full text
Get full text
Thesis -
17
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
18
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
19
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…This research hopes to give a clear idea to the readers about ABS algorithm. Further research about this topic is recommended to increase the efficiency of ABS algorithm implemented in communication field, so that more different types of field can be encrypted and decrypted instead of plaintext.…”
Get full text
Get full text
Undergraduates Project Papers -
20
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis
