Search Results - different ((evolutionary algorithm) OR (((generation algorithm) OR (encryption algorithm))))

Refine Results
  1. 1

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…These processes repeated until whole mesaage get involved into the last cipher. Encrypted messages are not equal under different run. …”
    Get full text
    Get full text
    Article
  6. 6

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…Both old and new implementations are used to encrypt and decrypt different sizes and types of files using different generated key sizes. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Mobile game application development using evolutionary algorithms by Ong, Jia Hui

    Published 2014
    “…Since it involves human users, adding Interactive Evolutionary Algorithm (IEA) together with EP has allowed further rules to be generated that are based on the user’s preferences. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Maintain optimal configurations for large configurable systems using multi-objective optimization by Jamil, Muhammad Abid, Alsadie, Deafallah, Nour, Mohamed K., Awang Abu Bakar, Normi Sham

    Published 2022
    “…In this paper, different multi-objective Evolutionary Algorithms like Non-Dominated Sorting Genetic algorithms II (NSGA-II) and NSGA-III and Indicator based Evolutionary Algorithm (IBEA) are applied to different feature models to generate optimal results for large configurable. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Evolutionary mating algorithm by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Mohd Mawardi, Saari, Hamdan, Daniyal, Mirjalili, Seyedali

    Published 2023
    “…This paper proposes a new evolutionary algorithm namely Evolutionary Mating Algorithm (EMA) to solve constrained optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game by Chang, Kee Tong

    Published 2015
    “…In the last experiment, the results showed that DE and EP algorithms can generate superior controllers whilst PDE is only capable to generate sub-optimal controllers. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Optimized energy extraction in tidal current technology using evolutionary algorithm by Min, Keng Tan, Chun, Chong Loo, Kit, Guan Lim, Pungut Ibrahim, Hui, Hwang Goh, Tze, Kenneth Kin Teo

    Published 2021
    “…The resultant tidal velocity is made up of 5 different partial tides. The tidal current turbine model is tested with different inputs of pitch angle and tidal current speed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  16. 16

    Parameter extraction of photovoltaic module using hybrid evolutionary algorithm by Muhsen D.H., Ghazali A.B., Khatib T.

    Published 2023
    “…Algorithms; Diodes; Extraction; Iterative methods; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Different evolutions; Differential Evolution; Diode modeling; Electromagnetism-like algorithm; Extracting parameter; Hybrid evolutionary algorithm; Photovoltaic model; Photovoltaic modules; Evolutionary algorithms…”
    Conference Paper
  17. 17

    Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys by Shereek, Balkees Mohamed

    Published 2016
    “…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Reusable data-path architecture for encryption-then-authentication on FPGA by Abbas Y.A., Jidin R., Jamil N., Zaba M.R.

    Published 2023
    “…For this proposed reusable data-path, we have chosen LED algorithm for encryption and then PHOTON to generate the MAC code. …”
    Article
  19. 19

    Multiobjective evolutionary algorithms NSGA-II and NSGA-III for software product lines testing optimization by Jamil, Muhammad Abid, Alhindi, Ahmad, Arif, Muhammad, Nour, Mohamed K, Awang Abu Bakar, Normi Sham, Aljabri, Tareq Fahad

    Published 2020
    “…This research, reports on the performance of a multi-objective Evolutionary Algorithms Non-Dominated Sorting Genetic Algorithm II (NSGA-II) and NSGA-III on Feature Models (FMs) to optimize SPL testing.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Key scheduling algorithm (KSA) is the mechanism that generates and schedules all sub-keys for each round of encryption. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis