Search Results - evaluation make difference ((evolution algorithm) OR (encryption algorithm))
Search alternatives:
- evolution algorithm »
- evaluation make »
- make difference »
-
1
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…A series of simulations were conducted using MATLAB to evaluate the performance of the proposed chaotic-based encryption algorithm for FTP through different analyses covering key sensitivity, histogram, correlations, differential, information entropy, and encryption/decryption speed. …”
Get full text
Get full text
Get full text
Article -
2
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The issue of misplaced pixel positions in the image was also adequately addressed, making it an effective method for image encryption. …”
Get full text
Get full text
Get full text
Article -
3
Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns
Published 2025“…Moreover, performance evaluation performance indicators that can be used to evaluate AES include; the encryption and decryption time, the CPU usage and how well AES performs on different platforms. …”
Article -
4
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…The Genetic Algorithm is an area in the field of Artificial Intelligence that is founded on the principles of biological evolution. …”
Get full text
Get full text
Thesis -
5
-
6
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
7
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Differential evolution (DE) is a simple yet powerful evolutionary algorithm (EA). …”
Get full text
Get full text
Thesis -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
9
A comparative study for parameter selection in online auctions
Published 2009“…In this work, three different models of genetic algorithms are considered. …”
Get full text
Get full text
Get full text
Thesis -
10
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…Further evolution of the ELEC routing protocol is presented to evaluate the impact of incremental cluster iv heads on the performance of WSN. …”
Get full text
Get full text
Thesis -
11
A novel framework for secure cryptocurrency transactions using quantum crypto guard
Published 2025“…In addition, the existing algorithms face difficulties like slow transaction speeds, interoperability issues between different cryptocurrencies, and privacy concerns. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
