Search Results - evaluation _ differences ((evolutionary algorithm) OR (encryption algorithm))
Search alternatives:
- evolutionary »
-
1
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. …”
Get full text
Get full text
Thesis -
2
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…The encryption algorithms are evaluated in turn by applying them to various images, separately. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…XTS mode of operation will be evaluated in terms of performance with different encryption algorithms such as AES (Advanced Encryption Standard), RC6 (Rivest Cipher version 6), and Twofish. …”
Get full text
Get full text
Thesis -
4
Evaluation of fast evolutionary programming, firefly algorithm and mutate-cuckoo search algorithm in single-objective optimization / Muhammad Zakyizzuddin Rosselan, Shahril Irwan S...
Published 2016“…In this study proposes an evaluation of different computational intelligences, i.e Fast-Evolutionary Algorithm (FEP), Firefly Algorithm (FA) and Mutate-cuckoo Search Algorithm (MCSA) for solving single-objective optimization problem. …”
Get full text
Get full text
Get full text
Article -
5
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
6
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…A series of simulations were conducted using MATLAB to evaluate the performance of the proposed chaotic-based encryption algorithm for FTP through different analyses covering key sensitivity, histogram, correlations, differential, information entropy, and encryption/decryption speed. …”
Get full text
Get full text
Get full text
Article -
7
-
8
A comprehensive comparison of evolutionary optimization limited by number of evaluations against time constraints
Published 2016“…Practically allevolutionary optimization studies have focused exclusively on the use of number of fitness evaluations as the constraining factor when comparing different evolutionary algorithms (EAs). …”
Get full text
Get full text
Get full text
Get full text
Article -
9
The performance of the 3DES and Fernet encryption in securing data files
Published 2024“…Five different text file sizes ranging from 10KB to 50KB were used for the experimental trial in evaluating the performance of both encryption methods. …”
Get full text
Article -
10
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
Published 2023Conference Paper -
11
The performance of the 3DES and fernet encryption in securing data files
Published 2024“…Five different text file sizes ranging from 10KB to 50KB were used for the experimental trial in evaluating the performance of both encryption methods. …”
Get full text
Get full text
Get full text
Article -
12
Lightweight encryption technique to enhance medical image security on internet of medical things applications
Published 2021“…Therefore, this paper presents an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
14
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. Permutation and substitution approaches of image encryption were deployed to address the issue of images volume and differing sizes. …”
Get full text
Get full text
Get full text
Article -
15
Global optimal analysis of variant genetic operations in solar tracking
Published 2023“…Lots of research has been carried out in solar tracking system using different types of Evolutionary Algorithm. In this research, genetic algorithm is explored to maximize the performance of solar tracking system. …”
Article -
16
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
Get full text
Get full text
Get full text
Thesis -
17
Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns
Published 2025“…Moreover, performance evaluation performance indicators that can be used to evaluate AES include; the encryption and decryption time, the CPU usage and how well AES performs on different platforms. …”
Article -
18
-
19
-
20
Optimization of multipurpose reservoir operation using evolutionary algorithms / Mohammed Heydari
Published 2017“…To evaluate the hybrid algorithm, optimization of hydro-power energy of Karun dams were considered. …”
Get full text
Get full text
Get full text
Thesis
