{"id":13951,"date":"2018-03-09T09:00:26","date_gmt":"2018-03-09T09:00:26","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/algoritmos-geneticos-y-criptoanalisis-aplicacion-de-nuevos-metodos-heuristicos\/"},"modified":"2018-03-09T09:00:26","modified_gmt":"2018-03-09T09:00:26","slug":"algoritmos-geneticos-y-criptoanalisis-aplicacion-de-nuevos-metodos-heuristicos","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/matematicas\/algoritmos-geneticos-y-criptoanalisis-aplicacion-de-nuevos-metodos-heuristicos\/","title":{"rendered":"Algoritmos gen\u00e9ticos y criptoanalisis. aplicaci\u00f3n de nuevos m\u00e9todos heuristicos."},"content":{"rendered":"<h2>Tesis doctoral de <strong> Jos\u00e9 Ram\u00f3n Soler Fuensanta <\/strong><\/h2>\n<p>Se empieza estudiando como antecedentes, la evoluci\u00f3n de la criptograf\u00eda y sus principios b\u00e1sicos, as\u00ed como los m\u00e9todos criptoanaliticos y su \u00e1mbito de aplicaci\u00f3n.  se introducen los algoritmos gen\u00e9ticos y su posibilidades como herramientas de resoluci\u00f3n de los problemas np-completos en los que se basan los m\u00e9todos de cifrado de clave p\u00fablica. Se implementan algoritmos gen\u00e9ticos para la resoluci\u00f3n del problema de la suma de lso subconjuntos y se realiza una evaluci\u00f3n de los par\u00e1metros, los operadores y la combinaci\u00f3n de ellos m\u00e1s adecuada para la resoluci\u00f3n del problema. Se introducen nuevas funciones de aptitud y se estudia el comportamiento de las mismas, as\u00ed como el concepto de operador de mutaci\u00f3n inducida por el problema como un m\u00e9todo de aportar informacion complementaria al algoritmo gen\u00e9tico.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Algoritmos gen\u00e9ticos y criptoanalisis. aplicaci\u00f3n de nuevos m\u00e9todos heuristicos.<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Algoritmos gen\u00e9ticos y criptoanalisis. aplicaci\u00f3n de nuevos m\u00e9todos heuristicos. <\/li>\n<li><strong>Autor:<\/strong>\u00a0 Jos\u00e9 Ram\u00f3n Soler Fuensanta <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Nacional de educaci\u00f3n a distancia<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 22\/11\/2001<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li> Minguet Meli\u00e1n Jes\u00fas M.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: manuel Castro gil <\/li>\n<li>Francisco Jos\u00e9 Perales l\u00f3pez (vocal)<\/li>\n<li>Juan  gabriel Tena ayuso (vocal)<\/li>\n<li> Molina mateos Jos\u00e9 Mar\u00eda (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Jos\u00e9 Ram\u00f3n Soler Fuensanta Se empieza estudiando como antecedentes, la evoluci\u00f3n de la criptograf\u00eda y sus principios [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[1890,37303,126,17070],"tags":[33497,45088,12502,30565,45089,45090],"class_list":["post-13951","post","type-post","status-publish","format-standard","hentry","category-ciencia-de-los-ordenadores","category-heuristica","category-matematicas","category-nacional-de-educacion-a-distancia","tag-francisco-jose-perales-lopez","tag-jose-ramon-soler-fuensanta","tag-juan-gabriel-tena-ayuso","tag-manuel-castro-gil","tag-minguet-melian-jesus-m","tag-molina-mateos-jose-maria"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/13951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=13951"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/13951\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=13951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=13951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=13951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}