Search Results - evaluation system difference ((evolution algorithm) OR (encryption algorithm))

Search alternatives:

Refine Results
  1. 1
  2. 2

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…A series of simulations were conducted using MATLAB to evaluate the performance of the proposed chaotic-based encryption algorithm for FTP through different analyses covering key sensitivity, histogram, correlations, differential, information entropy, and encryption/decryption speed. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…This research evaluates the performance of three different symmetric cryptography algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns by Hazzaa F., Qashou A., Al Barazanchi I.I., Sekhar R., Shah P., Bachute M., Abdulbaqi A.S.

    Published 2025
    “…Moreover, performance evaluation performance indicators that can be used to evaluate AES include; the encryption and decryption time, the CPU usage and how well AES performs on different platforms. …”
    Article
  7. 7

    Channel-aware downlink scheduling for quality of service in long term evolution network by Najim, Alaa Omer

    Published 2018
    “…The proposed algorithm using system-level simulation experiments with performance comparison with DBWPF in terms of end-to-end delay, fairness, system throughput, Packet Loss Ratio (PLR), and spectral efficiency was evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Global optimal analysis of variant genetic operations in solar tracking by Fam D.F., Koh S.P., Tiong S.K., Chong K.H.

    Published 2023
    “…Lots of research has been carried out in solar tracking system using different types of Evolutionary Algorithm. …”
    Article
  10. 10

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…Moreover, the complexity performance of the system is evaluated by Sample Entropy algorithm. Simulation results show that the new system has a wide hyperchaotic range with high complexity and sensitivity dependence. …”
    Get full text
    Get full text
    Thesis
  11. 11

    On fractional and semi-soft handover in long term evolution(LTE) networks by Hussein, Yaseein Soubhi, Mohd Ali, Borhanuddin, Varahram, Pooria

    Published 2011
    “…In this paper a hybrid HO algorithms called semi-soft handover (SSHO) and fractional soft handover (FSHO) in long term evolution (LTE) system are studied. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Secured communication can be achieved by encrypting and hiding data transmission when it is stored on a system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The recommendation for future work is to evaluate various type of data and different type of hashing algorithm.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Parameter extraction of solar photovoltaic modules using penalty-based differential evolution by Ishaque, K., Salam, Z., Mekhilef, Saad, Shamsudin, A.

    Published 2012
    “…This paper proposes a penalty based differential evolution (P-DE) for extracting the parameters of solar photovoltaic (PV) modules at different environmental conditions. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods by Kadhem, Athraa Ali

    Published 2017
    “…This study sought to examine the performance of three newly proposed techniques, for reliability assessment of the power systems, namely Disparity Evolution Genetic Algorithm (DEGA), Binary Particle Swarm Optimisation (BPSO), and Differential Evolution Optimization Algorithm (DEOA). …”
    Get full text
    Get full text
    Get full text
    Thesis