The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cryptographic technology is an important way to ensure information security, and is the kernel of information safety. Among all kinds of cryptographic algorithms the block cipher is of some virtues—the fast speed of encryption and decryption, the easy standardization, convenient implement by software and hardware, and so on. So the block cipher is the core parts of the data encryption, digital signature,...
Genetic algorithm is an iterative intelligent optimization algorithm which has characteristics of the robustness, parallelism, self-adaptivty and rapid convergence, etc. it is often used to help determine the split threshold in the application of image segmentation. This paper will more comprehensive refers to the basic information of genetic algorithms as well as the related theory of image segmentation...
Multi-objective Optimization Evolutionary Algorithm can be applied to problems in Economies, Management and Engineering; actually, most of design problem in real world can be reduced to multi-objective optimization problem. This paper proposed a new Evolutionary Algorithm based on Differential Evolution. The experimental results as the test-bed show that this algorithm can obtain quite fine approximated...
Distributed defense of distributed denial of service (DDoS) is one of the main research areas in DDoS recently. It is preferred to be conducted as the control-based defense. However, some existed methods have their respective disadvantages, such as efficiency, privacy. Therefore, a DDoS-oriented distributed defense framework based on the edge router feedbacks in autonomous systems (AS) is proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.