Search Results - (( mobile reduction methods algorithm ) OR ( rate information security algorithm ))
Search alternatives:
- reduction methods »
- methods algorithm »
- mobile reduction »
- rate information »
-
1
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Enhanced algorithm for energy-saving mechanism and frame response time reduction in IEEE 802.16e WiMAX
Published 2010“…Mobile Units have many constraints for reliable communication in today’s mobile environments. …”
Get full text
Get full text
Thesis -
3
Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks
Published 2014“…The results demonstrated that our proposed method results in significant reductions of HOF, HOPP and packet loss ratio (PLR) compared to the conventional HHO and enhanced weighted performance HO parameter optimization (EWPHPO) algorithm. …”
Get full text
Get full text
Thesis -
4
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…Furthermore, Optimized Parametric Topology Control Routing algorithm performs significantly better than Triangular Routing Method and Change Foreign Agent Algorithm. …”
Get full text
Get full text
Thesis -
5
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…Total average for bit error rate of 30 images is 0.59233. Average above 0.5 prove that the level of security encryption and decryption is very high and secure.…”
Get full text
Get full text
Thesis -
6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
7
-
8
PAPR Reduction Using Genetic Algorithm (GA) In OFDM System
Published 2018“…In order to reduce the PAPR performance in OFDM system, many reduction technique are explored. In this thesis, a Genetic algorithm (GA) technique is proposed. …”
Get full text
Get full text
Monograph -
9
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
10
Hardware Implementation Of Rc4a Stream Cipher Algorithm
Published 2007“…The security of sensitive information against ‘prying eyes’ has been of prime concern throughout the centuries. …”
Get full text
Get full text
Thesis -
11
Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs
Published 2014“…This paper presented a new algorithm using DSR routing cache technique to improve the routing between mobile nodes to reduction the effect of mobility in link transmitting that can solve link broken problem. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…The present situation demands extremely secured details of patients. Consequently, securing the patient's information from ransomware is the main challenge in the healthcare industry. …”
Get full text
Get full text
Article -
13
An enhanced fingerprint template protection scheme
Published 2022“…The matching/recognition performance evaluation produced higher verification rates and a low false rejection rate. The rates were 99.10 % and 0.90%, respectively. …”
Get full text
Get full text
Thesis -
14
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
15
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
16
Improving intrusion detection using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Article -
17
-
18
-
19
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
20
Improvement and application of particle swarm optimization algorithm
Published 2025“…Finally, real-world tests are performed to verify the proposed Algorithm's efficacy compared to existing optimization methods. …”
Get full text
Get full text
Article
