CFP last date
20 January 2025
Reseach Article

Security of Data over Internet using Genetic Algorithm

Published on July 2016 by Ghanshyam A. Sharma, Pankaj Mudholkar
International Conference on Advances in Information Technology and Management
Foundation of Computer Science USA
ICAIM2016 - Number 3
July 2016
Authors: Ghanshyam A. Sharma, Pankaj Mudholkar
210b66a8-abe3-46b6-b8a4-124556ad0b39

Ghanshyam A. Sharma, Pankaj Mudholkar . Security of Data over Internet using Genetic Algorithm. International Conference on Advances in Information Technology and Management. ICAIM2016, 3 (July 2016), 23-27.

@article{
author = { Ghanshyam A. Sharma, Pankaj Mudholkar },
title = { Security of Data over Internet using Genetic Algorithm },
journal = { International Conference on Advances in Information Technology and Management },
issue_date = { July 2016 },
volume = { ICAIM2016 },
number = { 3 },
month = { July },
year = { 2016 },
issn = 0975-8887,
pages = { 23-27 },
numpages = 5,
url = { /proceedings/icaim2016/number3/25517-1688/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Information Technology and Management
%A Ghanshyam A. Sharma
%A Pankaj Mudholkar
%T Security of Data over Internet using Genetic Algorithm
%J International Conference on Advances in Information Technology and Management
%@ 0975-8887
%V ICAIM2016
%N 3
%P 23-27
%D 2016
%I International Journal of Computer Applications
Abstract

Security of the data which flow over internet it highly insecure because every data is crucial to every user and most important to which data is related. There are already many more encryption and decryption algorithm to protect over data over internet from that I had proposed some new technique of the data protection. Since genetic algorithm nowadays mostly used in building robotic, artificial intelligence to way to think and behave like expert human system to take decision so I think to implement genetic algorithm over data across internet to immerge to era of encryption technique in the term of the security.

References
  1. Principle of soft computing author of the book is S. N. Sivanandam and S. N. Deepa under publication of Willey India Pvt. LTD ISDN-978-81-265-2741-0.
  2. http://scialert. net/fulltext/?doi=ajsr. 2008. 403. 411
  3. Principle of soft computing author of the book is S. N. Sivanandam and S. N. Deepa under publication of Willey India Pvt. LTD ISDN-978-81-265-2741-0.
Index Terms

Computer Science
Information Sciences

Keywords

Genetic Algorithm Network Security Flip Over Crossover Mutation Fitness Value.