Search Results - mode ((((evolution algorithm) OR (encryption algorithm))) OR (detection algorithm))
Search alternatives:
- evolution algorithm »
-
1
A parallel XTS encryption mode of operation
Published 2009“…Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Conference or Workshop Item -
2
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
Get full text
Get full text
Thesis -
3
Implementation of a parallel XTS encryption mode of operation
Published 2014“…Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Get full text
Article -
4
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
Get full text
Get full text
Thesis -
5
A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode
Published 2023“…A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode by Bahbibi Rahmatullah…”
Get full text
article -
6
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
7
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…The algorithm also supports two modes of operation namely EBC and CBC. …”
Get full text
Get full text
Article -
8
Image encryption algorithm based on chaotic mapping
Published 2003“…This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Analysis on target detection and classification in LTE based passive forward scattering radar
Published 2016“…The signal source is coming from the latest technology of 4G Long-Term Evolution (LTE) base station. A detailed explanation on the passive FSR receiver circuit, the detection scheme and the classification algorithm are given. …”
Get full text
Get full text
Get full text
Article -
11
VHDL implementation of DES algorithm / Emmanvel Kajan Mering
Published 2004Get full text
Get full text
Thesis -
12
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
13
Reusable data-path architecture for encryption-then-authentication on FPGA
Published 2023“…For this proposed reusable data-path, we have chosen LED algorithm for encryption and then PHOTON to generate the MAC code. …”
Article -
14
Dynamic smart grid communication parameters based cognitive radio network
Published 2023“…Simulation results highlight the superiority of the proposed system in terms of accuracy and convergence as compared with other evolution algorithms (genetic optimization, particle swarm optimization, and ant colony optimization) for different communication modes (power saving mode, high throughput mode, emergency communication mode, and balanced mode). � Czech Technical University in Prague, 2019.…”
Article -
15
Weighting method for modal parameter based damage detection algorithms
Published 2011“…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
16
Optimization of an extended H-infinity controller for unmanned helicopter control using multiobjective differential evolution (MODE)
Published 2015“…Then apply the MODE-based algorithm to optimize the weighting function of the control problem formulation for optimal performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm
Published 2024“…The unified RBF model is then used for autotuning the PID controller using the DE algorithm. The proposed RBF-NN system identification can successfully predict the attitude dynamics of a quadplane in all flight modes with a coefficient of determination of R2 greater than 0.9 and a computing mean time of less than 5 ms. …”
Get full text
Get full text
Get full text
Article -
19
Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm
Published 2024“…The unified RBF model is then used for autotuning the PID controller using the DE algorithm. The proposed RBF-NN system identification can successfully predict the attitude dynamics of a quadplane in all flight modes with a coefficient of determination of R2 greater than 0.9 and a computing mean time of less than 5 ms. …”
Get full text
Get full text
Get full text
Article -
20
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
Published 2004“…ClipSecure is rate to be the best fitted features of cryptography system in this project scope for it has choices of nine algorithms, plus a hardcore mode and support for both message and file encryption.…”
Get full text
Get full text
Get full text
Thesis
