Institute of Management Technology

Displaying 1-3 of 3 results

  • White Papers // Jul 2010

    Cloud Enabled Business

    Cloud computing, a relatively recent term builds on decades of research in virtualization, distributed computing, utility computing, networking, web and software services. It provides a service oriented architecture to reduce the information technology overhead for the end user. It also provides great flexibility, on-demand services, reduced total cost of ownership...

    Provided By Institute of Management Technology

  • White Papers // May 2009

    Cryptanalysis of SDES Via Evolutionary Computation Techniques

    The cryptanalysis of simplified data encryption standard can be formulated as NP-Hard combinatorial problem. The goal of this paper is two fold. First the authors want to make a study about how evolutionary computation techniques can efficiently solve the NP-Hard combinatorial problem. For achieving this goal they test several evolutionary...

    Provided By Institute of Management Technology

  • White Papers // Apr 2009

    A Comparison Between Memetic Algorithm and Genetic Algorithm for the Cryptanalysis of Simplified Data Encryption Standard Algorithm

    Genetic algorithms are a population-based Meta heuristics. They have been successfully applied to many optimization problems. However, premature convergence is an inherent characteristic of such classical genetic algorithms that makes them incapable of searching numerous solutions of the problem domain. A memetic algorithm is an extension of the traditional genetic...

    Provided By Institute of Management Technology

  • White Papers // Apr 2009

    A Comparison Between Memetic Algorithm and Genetic Algorithm for the Cryptanalysis of Simplified Data Encryption Standard Algorithm

    Genetic algorithms are a population-based Meta heuristics. They have been successfully applied to many optimization problems. However, premature convergence is an inherent characteristic of such classical genetic algorithms that makes them incapable of searching numerous solutions of the problem domain. A memetic algorithm is an extension of the traditional genetic...

    Provided By Institute of Management Technology

  • White Papers // May 2009

    Cryptanalysis of SDES Via Evolutionary Computation Techniques

    The cryptanalysis of simplified data encryption standard can be formulated as NP-Hard combinatorial problem. The goal of this paper is two fold. First the authors want to make a study about how evolutionary computation techniques can efficiently solve the NP-Hard combinatorial problem. For achieving this goal they test several evolutionary...

    Provided By Institute of Management Technology

  • White Papers // Jul 2010

    Cloud Enabled Business

    Cloud computing, a relatively recent term builds on decades of research in virtualization, distributed computing, utility computing, networking, web and software services. It provides a service oriented architecture to reduce the information technology overhead for the end user. It also provides great flexibility, on-demand services, reduced total cost of ownership...

    Provided By Institute of Management Technology