Search Results - relations from different ((evolution algorithm) OR (encryption algorithm))*
Search alternatives:
- evolution algorithm »
- relations from »
-
1
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
2
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…XTS mode of operation will be evaluated in terms of performance with different encryption algorithms such as AES (Advanced Encryption Standard), RC6 (Rivest Cipher version 6), and Twofish. …”
Get full text
Get full text
Thesis -
3
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
4
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…They possess a wide range of applications, spanning from guaranteeing the security of web traffic through protocols like SSL/TLS to encrypting confidential data stored on hard drives. …”
Get full text
Get full text
Thesis -
5
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
6
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
7
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
8
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
9
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
Get full text
Get full text
Get full text
Article -
10
Channel-aware downlink scheduling for quality of service in long term evolution network
Published 2018“…In this thesis, a Delay-oriented Resource Allocation (DoRA) scheduler is proposed to provide an efficient allocation of wireless resources across users of different traffic volumes to minimize delay. Initially, a range of constraints was defined based on a recent algorithm from the literature, namely Delay Based Weighted Proportional Fair (DBWPF). …”
Get full text
Get full text
Get full text
Thesis -
11
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Key scheduling algorithm (KSA) is the mechanism that generates and schedules all sub-keys for each round of encryption. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
An e-voting application using cryptography technology
Published 2020“…Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…Furthermore, the right and left occipital channels may help in identifying happiness, sadness, surprise and neutral emotional states. The DEFS_Ch algorithm raised the linear discriminant analysis (LDA) classification accuracy from 80% to 86.85%, indicating that DEFS_Ch may offer a useful way for reliable enhancement of the detection of different emotional states of the brain regions.…”
Get full text
Get full text
Conference or Workshop Item -
14
A new 128-bit block cipher
Published 2009“…Towards that and after reviewing related research, in this research we propose to come up with a new 128-bit block cipher cryptographic algorithm which shall meet the security requirements. …”
Get full text
Get full text
Thesis -
15
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009“…A special group based on a linear recurrence equation plays an important role in modern cryptography. Its relation appeared differently in various cryptosystem. …”
Get full text
Get full text
Get full text
Article -
16
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
-
18
-
19
-
20
Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game
Published 2015“…The proposed EC methods are Genetic Algorithm (GA), Differential Evolution (DE), Evolutionary Programming (EP), and Pareto-based Differential Evolution (PDE). …”
Get full text
Get full text
Get full text
Thesis
