Search Results - ((((evolution OR evolution) OR solution) algorithm) OR (encryption algorithm))
-
1
Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time
Published 2021“…This paper propose a Secured Modified Advanced Encryption Standard Algorithm with decreasing the rounds of Advanced Encryption Standard (AES) to 14 rounds in order to minimize encryption and decryption process time and increasing digital data security as well. …”
Get full text
Get full text
Get full text
Article -
2
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Hence, thoughtfully chosen and practically tested encryption algorithm must be performed to enhance the device efficiency and decrease the risk of sensitive data exposure. …”
Get full text
Get full text
Article -
3
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…Genetic Algorithms are very efficient at exploring the entire search space; however, they are relatively poor at finding the precise local optimal solution in the region at which the algorithm converges. …”
Get full text
Get full text
Get full text
Article -
4
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…The Data Encryption Standard (DES) algorithm is a symmetric key algorithm for the encryption of electronic and allowed for information. …”
Get full text
Get full text
Student Project -
7
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
8
Multiobjective optimization of bioethanol production via hydrolysis using hopfield- enhanced differential evolution
Published 2014“…In this chapter, the weighted sum scalarization approach is used in conjunction with three meta-heuristic algorithms: Differential Evolution (DE), Hopfield-Enhanced Differential Evolution (HEDE), and Gravitational Search Algorithm (GSA). …”
Get full text
Get full text
Book -
9
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024Subjects:journal::journal article -
10
Optimal HE-PWM inverter switching patterns using differential evolution algorithm
Published 2012“…The DE algorithm needs a relative small amount of generations to reach accurate solutions with appropriate control parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…Under the control of the dynamic encryption step algorithm, it effectively destroys the correlation between the source image’s pixels. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
12
Multi-Objectives Memetic Discrete Differential Evolution Algorithm for Solving the Container Pre-Marshalling Problem
Published 2019“…The experimental results reveal that the proposed MODDE algorithm can find good solutions on instances of the standard pre-marshalling benchmarks. …”
Get full text
Get full text
Article -
13
Broadening selection competitive constraint handling algorithm for faster convergence
Published 2020“…In this study, the BSCCH algorithm has been coupled with Differential Evolution algorithm as a proof of concept because it is found to be an efficient algorithm in the literature for constrained optimization problems. …”
Get full text
Get full text
Article -
14
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…In this research, VoIP security was enhanced via a proposed cryptographic system. The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Economic power dispatch solution with non-smooth cost functions using differential evolution: article / Muhammad Firdaus Abd Rahim
Published 2011“…This thesis proposes a solution for Economic Dispatch problems with non-smooth cost functions using Differential Evolution (DE) algorithm. …”
Get full text
Get full text
Article -
16
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The deployment of network security procedures requires the implementation of Cryptographic algorithms. To facilitate this security issue, it is best to define a problem and advice a solution. …”
Get full text
Get full text
Thesis -
17
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…The AES algorithm is the cryptographic technique used to lock or encrypt data. …”
Get full text
Get full text
Get full text
Article -
18
Economic power dispatch solution with non-smooth cost functions using differential evolution / Muhammad Firdaus Abd Rahim
Published 2011“…This thesis proposes a solution for Economic Dispatch problems with non-smooth cost functions using Differential Evolution (DE) algorithm. …”
Get full text
Get full text
Thesis -
19
An improved chaotic image encryption algorithm
Published 2018“…Chaotic-based image encryption algorithms are countless in number. Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
Get full text
Get full text
Thesis
