Search Results - (( based encryption means algorithm ) OR ( based optimization means algorithm ))*
Search alternatives:
- optimization means »
- means algorithm »
-
1
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The first research objective is to develop a new deep learning algorithm by a hybrid of DNN and K-Means Clustering algorithms for estimating the Lorenz chaotic system. …”
Get full text
Get full text
Thesis -
2
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…Mathematical analysis is carried out to identify important features, advantages and disadvantages of the new signed-digit {0,1,3}-NAF scalar multiplication algorithm. Cost measurement is based on number of point operations per scalar throughout the execution of the scalar multiplication algorithm. …”
Get full text
Get full text
Thesis -
3
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…However, most of the existing embedding algorithms are incapable of overcoming the adverse effects of the challenges simultaneously. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Embedded PC based wireless communication using XTEA
Published 2010“…It focuses mainly on cryptography and its implementation in an embedded system. The Extended Tiny Encryption Algorithm (XTEA) is the chosen encryption method. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption
Published 2021“…To address this issue, we proposed a reinforcement hiding in access policy over Cloud storage by enhancing the Ciphertext Policy Attribute-based Encryption (CP-ABE) algorithm. Besides the encryption process, the reinforced CPABE used logical connective operations to hide the attribute value of data in the access policy. …”
Get full text
Get full text
Article -
7
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
-
10
Optimal neural network approach for estimating state of energy of lithium-ion battery using heuristic optimization techniques
Published 2023Conference Paper -
11
Optimized clustering with modified K-means algorithm
Published 2021“…Among the techniques, the k-means algorithm is the most commonly used technique for determining optimal number of clusters (k). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
13
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
14
-
15
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
16
Impact of evolutionary algorithm on optimization of nonconventional machining process parameters
Published 2025“…This paper presents the optimization of laser beam machining in additive manufacturing of polymer-based material parameters, specifically focusing on cutting speed, gas pressure of nitrogen, and focal point locations, to achieve optimal mean surface roughness. …”
Get full text
Get full text
Get full text
Article -
17
Document clustering based on firefly algorithm
Published 2015“…Document clustering is widely used in Information Retrieval however, existing clustering techniques suffer from local optima problem in determining the k number of clusters.Various efforts have been put to address such drawback and this includes the utilization of swarm-based algorithms such as particle swarm optimization and Ant Colony Optimization.This study explores the adaptation of another swarm algorithm which is the Firefly Algorithm (FA) in text clustering.We present two variants of FA; Weight- based Firefly Algorithm (WFA) and Weight-based Firefly Algorithm II (WFAII).The difference between the two algorithms is that the WFAII, includes a more restricted condition in determining members of a cluster.The proposed FA methods are later evaluated using the 20Newsgroups dataset.Experimental results on the quality of clustering between the two FA variants are presented and are later compared against the one produced by particle swarm optimization, K-means and the hybrid of FA and -K-means. …”
Get full text
Get full text
Get full text
Article -
18
Fuzzy C-Mean And Genetic Algorithms Based Scheduling For Independent Jobs In Computational Grid
Published 2006“…Our model presents the method of the jobs classifications based mainly on Fuzzy C-Mean algorithm and mapping the jobs to the appropriate resources based mainly on Genetic algorithm. …”
Get full text
Get full text
Article -
19
Modified archive update mechanism of multi-objective particle swarm optimization in fuzzy classification and clustering
Published 2022“…Among multi-objective evolutionary algorithms proposed in the literature, particle swarm optimization (PSO)-based multi-objective (MOPSO) algorithm has been cited to be the most representative. …”
Get full text
Get full text
Thesis -
20
Cluster optimization in VANET using MFO algorithm and K-Means clustering
Published 2023“…Proven to be an effective and efficient method for solving optimization problem. To design K-Means algorithm that portion nodes based on their proximities by optimize the distance between nodes within same cluster by assigning them to the closet cluster center. …”
Get full text
Get full text
Conference or Workshop Item
