Search Results - evaluation process difference ((encryption algorithm) OR (evolutionary algorithm))
Search alternatives:
- process difference »
-
1
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. …”
Get full text
Get full text
Thesis -
2
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
3
The performance of the 3DES and Fernet encryption in securing data files
Published 2024“…In addition, this study evaluates the temporal efficiency for the encryption process. …”
Get full text
Article -
4
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…XTS mode of operation will be evaluated in terms of performance with different encryption algorithms such as AES (Advanced Encryption Standard), RC6 (Rivest Cipher version 6), and Twofish. …”
Get full text
Get full text
Thesis -
5
-
6
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…A series of simulations were conducted using MATLAB to evaluate the performance of the proposed chaotic-based encryption algorithm for FTP through different analyses covering key sensitivity, histogram, correlations, differential, information entropy, and encryption/decryption speed. …”
Get full text
Get full text
Get full text
Article -
7
The performance of the 3DES and fernet encryption in securing data files
Published 2024“…In addition, this study evaluates the temporal efficiency for the encryption process. …”
Get full text
Get full text
Get full text
Article -
8
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
Published 2023Conference Paper -
9
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
Get full text
Get full text
Get full text
Thesis -
10
Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns
Published 2025“…Moreover, performance evaluation performance indicators that can be used to evaluate AES include; the encryption and decryption time, the CPU usage and how well AES performs on different platforms. …”
Article -
11
-
12
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…As a comparative study, the performance of the algorithms was evaluated based on various standard metrics. …”
Get full text
Get full text
Thesis -
13
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
Get full text
Get full text
Get full text
Article -
14
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
Get full text
Get full text
Get full text
Article -
15
Identifying movement of object in multiple images via particle swarm optimization algorithm / Mohd Haidhar Iqbal Hassan
Published 2016“…In PSO algorithm, it solved the problem by using their own process such as particle initialization, evaluate fitness, convergence and other things. …”
Get full text
Get full text
Student Project -
16
-
17
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2023“…The main motivation for this study is to introduce and evaluate an advance new customized GA. Comparison results of different combinatorial operators and tests with different probability factors are shown. …”
Article -
18
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2023“…The main motivation for this study is to introduce and evaluate an advance new customized GA. Comparison results of different combinatorial operators and tests with different probability factors are shown. …”
Article -
19
Biogeography based optimization (BBO) algorithm to minimise non-productive time during hole-making process
Published 2015“…This paper presents an evolutionary optimization algorithm based on geographic distribution of biological organism to deal with hole-making process problem. …”
Get full text
Get full text
Get full text
Article -
20
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Differential evolution (DE) is a simple yet powerful evolutionary algorithm (EA). It has demonstrated good convergence, and its principles are easy to understand. …”
Get full text
Get full text
Thesis
