Search Results - parallel information ((evolutionary algorithm) OR (encryption algorithm))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1
  2. 2

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase by Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir

    Published 2007
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Improving security performance with parallel crypto operations in SSL bulk data transfer by Alaidaros, Hashem Mohammed, Othman, Mohamed, A. Rasid, Mohd Fadlee

    Published 2009
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…Due to the promising prospect ofchaotic encryption in the field ofcryptography, and the lack ofimplementation ofthis new encryption-decryption algorithm, this project focuses on introducing a new symmetric encryption-decryption scheme based on a chaos system for VoIP.…”
    Get full text
    Get full text
    Final Year Project
  11. 11

    A comparative review on symmetric and asymmetric dna-based cryptography by Hammad B.T., Sagheer A.M., Ahmed I.T., Jamil N.

    Published 2023
    “…Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information. In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. …”
    Article
  12. 12

    Artificial neural network learning enhancement using Artificial Fish Swarm Algorithm by Hasan, Shafaatunnur, Tan, Swee Quo, Shamsuddin, Siti Mariyam, Sallehuddin, Roselina

    Published 2011
    “…Artificial Neural Network (ANN) is a new information processing system with large quantity of highly interconnected neurons or elements processing parallel to solve problems.Recently, evolutionary computation technique, Artificial Fish Swarm Algorithm (AFSA) is chosen to optimize global searching of ANN.In optimization process, each Artificial Fish (AF) represents a neural network with output of fitness value.The AFSA is used in this study to analyze its effectiveness in enhancing Multilayer Perceptron (MLP) learning compared to Particle Swarm Optimization (PSO) and Differential Evolution (DE) for classification problems.The comparative results indeed demonstrate that AFSA show its efficient, effective and stability in MLP learning.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures by Koohi, Sina Zangbari

    Published 2020
    “…Hence, there is yet room for improvement. Moreover, evolutionary algorithms are generally limited in their problemsolving abilities. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission by Bhattacharjee, S., Rahim, L.B.A., Watada, J., Roy, A.

    Published 2020
    “…It increases confidentiality and offers a backup for accidental data loss by combining the simplified data encryption standard (SDES) and an advanced pattern generation technique that uses a unique pattern generation table. …”
    Get full text
    Get full text
    Article