Search Results - model ((((generation algorithm) OR (encryption algorithm))) OR (detection algorithm))

Refine Results
  1. 1
  2. 2
  3. 3

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…The image encryption algorithm depends on the Fridrich encryption model; thus, an enhancement of this structure is proposed. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…An encrypted malicious traffic is able to evade the detection by IDS. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…An encrypted malicious traffic is able to evade the detection by IDS. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model by Jasim, Ahmed Abdulhadi, Idris, Mohd Yamani Idna, Azzuhri, Saaidal Razalli, Issa, Noor Riyadh, Noor, Noorzaily Mohamed, Kakarla, Jagadeesh, Amiri, Iraj Sadegh

    Published 2019
    “…The base station node will verify the fake aggregated data when the packets are received using the generated key earlier. Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
    Get full text
    Get full text
    Article
  9. 9

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  11. 11

    Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan by Md Disa, Nor Anees Asyiqin, Khairul Anwar, Khairunnisa Munawarah, Mazlan, Aniesa Farhana

    Published 2022
    “…This descriptive-analytical was resolved using the formulation of the study such as point addition, point doubling and double-and-add algorithm. Kuwakado scheme (2018) had be summarized in key generation, encryption, and decryption algorithm. …”
    Get full text
    Get full text
    Student Project
  12. 12

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…This possibility is demonstrated by the fact that this system can be built. The proposed model is able to protect the DNA sequence stored in the Fog Computing cloud from plain text attacks by generating (I) the main key, which is the key to the EAES encryption algorithm, (II) the rule 1 key, which represents the DNA base number of possible key probabilities, and (III) the rule 2 key, which represents the number of binding probabilities for the DNA helical structure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. In this algorithm, the essential requirements of confusion and diffusion are accomplished, and a stochastic sequence is used to enhance the security of encrypted image. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Designing New Block Cipher Based On Genetic Algorithm Approach by Nur Hafiza Binti Zakaria, Ramlan Mahmod, Nur Izura Udzir, Zuriati Ahmad Zukarnain, Suriyani Ariffin

    Published 2024
    “…To satisfy the information security requirements and to enhance the information security, we need secured communication and data which can be attained by encrypting the data. In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Article
  16. 16

    Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator by Alemu Lemma, Tamiru, Mohd Hashim, Fakhruldin

    Published 2011
    “…The fuzzy models are trained applying locally linear model tree algorithm followed by a meta-heuristic nature inspired algorithm called bat algorithm. …”
    Get full text
    Conference or Workshop Item
  17. 17

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…In this thesis, new algorithms are proposed for the key generation, encryption and decryption module of KD-3D-CA block cipher based on von Neumann (3D) cellular automata. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Experimental evaluation of data fusion algorithm for residual generation in detecting UAV servo actuator fault by Sahwee Z., Rahman N.A., Sahari K.S.M.

    Published 2023
    “…Algorithms; Data fusion; Hardware; Military vehicles; Redundancy; Software reliability; Unmanned aerial vehicles (UAV); Analytical redundancy; Data fusion algorithm; Experimental evaluation; Fault detection algorithm; Hostile environments; Model reference methods; On-board fault detection; Software and hardwares; Fault detection…”
    Article
  19. 19

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…The Diffie-Hellman key exchange and Rivest Shamir Adleman (RSA) key generation algorithms have been used to authenticate the receiver, and key generation for encrypting and decrypting processes, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Development of control algorithm for a new 12s-6p single phase field excited flux switching motor by Amin, Faisal

    Published 2020
    “…In terms of simulation and prototype performance comparison, Bi-polar DC algorithm is about 92% efficient in torque generation in case of initial model of FEFSM and staggering efficiency around 96% in case of optimized motor model.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis