Search Results - evaluation _ differences ((evolutionary algorithm) OR (encryption algorithm))

Search alternatives:

Refine Results
  1. 1

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…This research evaluates the performance of three different symmetric cryptography algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Performance evaluation for different data encryption algorithms on wireless sensor network (WSN) by Mhawesh, Thoalfekarali Zuhair

    Published 2018
    “…The encryption algorithms are evaluated in turn by applying them to various images, separately. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…XTS mode of operation will be evaluated in terms of performance with different encryption algorithms such as AES (Advanced Encryption Standard), RC6 (Rivest Cipher version 6), and Twofish. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Evaluation of fast evolutionary programming, firefly algorithm and mutate-cuckoo search algorithm in single-objective optimization / Muhammad Zakyizzuddin Rosselan, Shahril Irwan S... by Rosselan, Muhammad Zakyizzuddin, Sulaiman, Shahril Irwan, Othman, Norhalida

    Published 2016
    “…In this study proposes an evaluation of different computational intelligences, i.e Fast-Evolutionary Algorithm (FEP), Firefly Algorithm (FA) and Mutate-cuckoo Search Algorithm (MCSA) for solving single-objective optimization problem. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…A series of simulations were conducted using MATLAB to evaluate the performance of the proposed chaotic-based encryption algorithm for FTP through different analyses covering key sensitivity, histogram, correlations, differential, information entropy, and encryption/decryption speed. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    A comprehensive comparison of evolutionary optimization limited by number of evaluations against time constraints by Jia, Hui Ong, Teo, Jason Tze Wi

    Published 2016
    “…Practically allevolutionary optimization studies have focused exclusively on the use of number of fitness evaluations as the constraining factor when comparing different evolutionary algorithms (EAs). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    The performance of the 3DES and Fernet encryption in securing data files by Mohd, Siti Munirah, Kamarudin, Shafinah, Yahya, Norhanizah, Hasan, Sazlinah, Mahamad Zakaria, Muhammad Luqman, Sulaiman, Sahimel Azwal, Setyohadi, Djoko Budiyanto

    Published 2024
    “…Five different text file sizes ranging from 10KB to 50KB were used for the experimental trial in evaluating the performance of both encryption methods. …”
    Get full text
    Article
  10. 10
  11. 11

    The performance of the 3DES and fernet encryption in securing data files by Siti Munirah, Mohd, Shafinah, Kamarudin, Norhanizah, Yahya, Sazlinah, Hasan, Muhammad Luqman, Mahamad Zakaria, Sahimel Azwal, Sulaiman, Setyohadi, Djoko Budiyanto

    Published 2024
    “…Five different text file sizes ranging from 10KB to 50KB were used for the experimental trial in evaluating the performance of both encryption methods. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. Permutation and substitution approaches of image encryption were deployed to address the issue of images volume and differing sizes. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Global optimal analysis of variant genetic operations in solar tracking by Fam D.F., Koh S.P., Tiong S.K., Chong K.H.

    Published 2023
    “…Lots of research has been carried out in solar tracking system using different types of Evolutionary Algorithm. In this research, genetic algorithm is explored to maximize the performance of solar tracking system. …”
    Article
  16. 16

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns by Hazzaa F., Qashou A., Al Barazanchi I.I., Sekhar R., Shah P., Bachute M., Abdulbaqi A.S.

    Published 2025
    “…Moreover, performance evaluation performance indicators that can be used to evaluate AES include; the encryption and decryption time, the CPU usage and how well AES performs on different platforms. …”
    Article
  18. 18
  19. 19
  20. 20

    Optimization of multipurpose reservoir operation using evolutionary algorithms / Mohammed Heydari by Mohammed , Heydari

    Published 2017
    “…To evaluate the hybrid algorithm, optimization of hydro-power energy of Karun dams were considered. …”
    Get full text
    Get full text
    Get full text
    Thesis