Search Results - evaluation system difference ((evolution algorithm) OR (encryption algorithm))
Search alternatives:
- evolution algorithm »
- evaluation system »
-
1
-
2
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…A series of simulations were conducted using MATLAB to evaluate the performance of the proposed chaotic-based encryption algorithm for FTP through different analyses covering key sensitivity, histogram, correlations, differential, information entropy, and encryption/decryption speed. …”
Get full text
Get full text
Get full text
Article -
3
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The average encryption time of 184(μs) on seven (7) images showed that it could to be deployed for real-time systems. …”
Get full text
Get full text
Get full text
Article -
5
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. …”
Get full text
Get full text
Thesis -
6
Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns
Published 2025“…Moreover, performance evaluation performance indicators that can be used to evaluate AES include; the encryption and decryption time, the CPU usage and how well AES performs on different platforms. …”
Article -
7
Channel-aware downlink scheduling for quality of service in long term evolution network
Published 2018“…The proposed algorithm using system-level simulation experiments with performance comparison with DBWPF in terms of end-to-end delay, fairness, system throughput, Packet Loss Ratio (PLR), and spectral efficiency was evaluated. …”
Get full text
Get full text
Get full text
Thesis -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
9
Global optimal analysis of variant genetic operations in solar tracking
Published 2023“…Lots of research has been carried out in solar tracking system using different types of Evolutionary Algorithm. …”
Article -
10
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…Moreover, the complexity performance of the system is evaluated by Sample Entropy algorithm. Simulation results show that the new system has a wide hyperchaotic range with high complexity and sensitivity dependence. …”
Get full text
Get full text
Thesis -
11
On fractional and semi-soft handover in long term evolution(LTE) networks
Published 2011“…In this paper a hybrid HO algorithms called semi-soft handover (SSHO) and fractional soft handover (FSHO) in long term evolution (LTE) system are studied. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
14
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
Get full text
Get full text
Thesis -
15
A new 128-bit block cipher
Published 2009“…Secured communication can be achieved by encrypting and hiding data transmission when it is stored on a system. …”
Get full text
Get full text
Thesis -
16
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The recommendation for future work is to evaluate various type of data and different type of hashing algorithm.…”
Get full text
Get full text
Thesis -
17
Parameter extraction of solar photovoltaic modules using penalty-based differential evolution
Published 2012“…This paper proposes a penalty based differential evolution (P-DE) for extracting the parameters of solar photovoltaic (PV) modules at different environmental conditions. …”
Get full text
Get full text
Article -
18
-
19
Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations
Published 2023Conference Paper -
20
Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods
Published 2017“…This study sought to examine the performance of three newly proposed techniques, for reliability assessment of the power systems, namely Disparity Evolution Genetic Algorithm (DEGA), Binary Particle Swarm Optimisation (BPSO), and Differential Evolution Optimization Algorithm (DEOA). …”
Get full text
Get full text
Get full text
Thesis
