Search Results - (( mobile reduction methods algorithm ) OR ( based information security algorithm ))

Refine Results
  1. 1
  2. 2

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Enhanced algorithm for energy-saving mechanism and frame response time reduction in IEEE 802.16e WiMAX by Baker, Alaa M.

    Published 2010
    “…Mobile Units have many constraints for reliable communication in today’s mobile environments. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks by Hussein, Yassein Soubhi

    Published 2014
    “…The results demonstrated that our proposed method results in significant reductions of HOF, HOPP and packet loss ratio (PLR) compared to the conventional HHO and enhanced weighted performance HO parameter optimization (EWPHPO) algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…Furthermore, Optimized Parametric Topology Control Routing algorithm performs significantly better than Triangular Routing Method and Change Foreign Agent Algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Research on the security algorithm of reversible information hiding in communication encrypted image by Jijun, Wang, Soo, Fun Tan, Yi, Yuan

    Published 2021
    “…Considering the embedding capacity and the security of the algorithm, the paper proposes a reversible information hiding algorithm for encrypted images based on. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  7. 7

    A review on the graphical user authentication algorithm : recognition-based and recall-based. by Ugochukwu, Ejike Ekeke Kingsley, Jusoh, Yusmadi Yah

    Published 2013
    “…User authentication has become an important consideration in information security as traditional password-based schemes are constantly subjected to attacks. …”
    Get full text
    Get full text
    Article
  8. 8

    Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki by Hamad Zaki, Ahmad Wafiy Hamad Zaki

    Published 2013
    “…The objectives of this project are to apply the encryption algorithm into these tools for securing the information collected by keystroke logging mechanism. …”
    Get full text
    Get full text
    Student Project
  9. 9

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Mobile information security should be enhanced to new scheme that more simple and use the small key size, also high security level. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
    Get full text
    Get full text
    Article
  11. 11

    PAPR Reduction Using Genetic Algorithm (GA) In OFDM System by Mohd Ramdan, Fatin Najwa Nursyadza

    Published 2018
    “…In order to reduce the PAPR performance in OFDM system, many reduction technique are explored. In this thesis, a Genetic algorithm (GA) technique is proposed. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Computer information and network security has recently become a popular subject due to the explosive growth of the Internet and the migration of commerce practices to the electronic medium. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Symmetric Key Size for Different Level of Information Classification by Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…The classification depends on the level of damage to an organization or to national security when the information is disclosed. Therefore confidential information is normally protected by using cryptographic algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed by Mohamed, Kamsiah

    Published 2022
    “…Cryptography requires a secure technique to ensure that the enemy is prevented while securing legitimate users gaining access to information. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20