Search Results - (( based encryption process algorithm ) OR ( evolution optimization model algorithm ))
Search alternatives:
- evolution optimization »
- encryption process »
- optimization model »
- process algorithm »
- model algorithm »
-
1
Two level Differential Evolution algorithms for ARMA parameters estimatio
Published 2013“…An Evolutionary Algorithm (EA) comprising two-level Differential Evolution (DE) optimization scheme is proposed. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…Based on the research that had been conducted, it shows that the enhanced algorithm have managed to speed up the computational process for encryption and decryption of the text in the Android platform to reduce computational overhead. …”
Get full text
Get full text
Thesis -
3
On the Computational Cost of Cocks’ Identity Based Encryption
Published 2018“…Unfortunately, lack of efficiency becomes a major drawback of the Cocks’ Identity Based Encryption. The algorithms in Cocks’ Identity Based Encryption consists of four stages: Setup, Extract, Encrypt and Decrypt. …”
Get full text
Get full text
Article -
4
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
5
An improved chaotic image encryption algorithm
Published 2018“…Chaotic-based image encryption algorithms are countless in number. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Encryption selection for WLAN IEEE802.11G
Published 2013“…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
Get full text
Get full text
Thesis -
7
-
8
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
9
Reliably optimal PMU placement using disparity evolution-based genetic algorithm
Published 2017“…The optimization model is solved for IEEE 118 standard bus system. …”
Get full text
Get full text
Get full text
Article -
10
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
11
Parameter Estimation Using Improved Differential Evolution And Bacterial Foraging Algorithms To Model Tyrosine Production In Mus Musculus(Mouse)
Published 2015“…Global optimisation method includes differential evolution algorithm, which will be used in this research. …”
Get full text
Get full text
Get full text
Article -
12
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010“…We present a methodology for the transformation of CPU-based implementation of Serpent encryption algorithm (in C language) on CUDA to take advantage of CUDA’s parallel processing capability. …”
Get full text
Get full text
Conference or Workshop Item -
14
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010“…We present a methodology for the transformation of CPU-based implementation of Serpent encryption algorithm (in C language) on CUDA to take advantage of CUDA’s parallel processing capability. …”
Get full text
Get full text
Conference or Workshop Item -
15
Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution
Published 2014“…This study proposes a hybrid of conventional back propagation training algorithm for the NARX network and multiobjective differential evolution (MODE) algorithm for identification of a nonlinear model of an unmanned small scale helicopter from experimental flight data.The proposed hybrid algorithm was able to produce models with Pareto-optimal compromise between the design objectives. …”
Get full text
Get full text
Get full text
Article -
16
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
Get full text
Get full text
Thesis -
17
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Optimization Of Fractional-Slot Permanent Magnet Synchronous Machine Using Analytical Sub-Domain Model And Differential Evolution
Published 2019“…From the results obtained, the Analytical Sub-Domain Differential Evolution Algorithm (ASDEA) has better optimization technique capability compared with Analytical Sub-Domain Particle Swarm Optimization (ASPSO). …”
Get full text
Get full text
Thesis -
19
Hybrid algorithm for NARX network parameters' determination using differential evolution and genetic algorithm
Published 2013“…The proposed algorithm involves a two level optimization scheme to search for both optimal network architecture and weights. …”
Get full text
Get full text
Get full text
Article -
20
