Search Results - evaluation system difference ((evolutionary algorithm) OR (encryption algorithm))

Search alternatives:

Refine Results
  1. 1

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…This research evaluates the performance of three different symmetric cryptography algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…A series of simulations were conducted using MATLAB to evaluate the performance of the proposed chaotic-based encryption algorithm for FTP through different analyses covering key sensitivity, histogram, correlations, differential, information entropy, and encryption/decryption speed. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Global optimal analysis of variant genetic operations in solar tracking by Fam D.F., Koh S.P., Tiong S.K., Chong K.H.

    Published 2023
    “…Lots of research has been carried out in solar tracking system using different types of Evolutionary Algorithm. …”
    Article
  7. 7
  8. 8

    Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns by Hazzaa F., Qashou A., Al Barazanchi I.I., Sekhar R., Shah P., Bachute M., Abdulbaqi A.S.

    Published 2025
    “…Moreover, performance evaluation performance indicators that can be used to evaluate AES include; the encryption and decryption time, the CPU usage and how well AES performs on different platforms. …”
    Article
  9. 9
  10. 10

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…As a comparative study, the performance of the algorithms was evaluated based on various standard metrics. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimization of multipurpose reservoir operation using evolutionary algorithms / Mohammed Heydari by Mohammed , Heydari

    Published 2017
    “…To evaluate the hybrid algorithm, optimization of hydro-power energy of Karun dams were considered. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…Moreover, the complexity performance of the system is evaluated by Sample Entropy algorithm. Simulation results show that the new system has a wide hyperchaotic range with high complexity and sensitivity dependence. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms by Koh, Johnny Siaw Paw

    Published 2008
    “…The main motivation for this research is to introduce and evaluate an advance new customized GA. Comparison results of different combinatorial operators, and tests with different probability factors are shown. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module by Koh J.S.P., Aris I.B., Ramachandaramurthy V.K., Bashi S.M., Marhaban M.H.

    Published 2023
    “…This research presents a new approach to optimise the performance of a multiple-beam optical scanning system in terms of its marking combinations and speed, using Genetic Algorithm (GA). …”
    Article
  18. 18

    Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module by Koh J.S.P., Aris I.B., Ramachandaramurthy V.K., Bashi S.M., Marhaban M.H.

    Published 2023
    “…This research presents a new approach to optimise the performance of a multiple-beam optical scanning system in terms of its marking combinations and speed, using Genetic Algorithm (GA). …”
    Article
  19. 19
  20. 20

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis