Search Results - (( parameter evaluation bat algorithm ) OR ( based encryption method algorithm ))
Search alternatives:
- parameter evaluation »
- encryption method »
- method algorithm »
- evaluation bat »
- bat algorithm »
-
1
A study on the parameter selection of bat algorithm in in optimizing parameters in camera auto calibration problem
Published 2022“…Each bat in the Bat Algorithm represents a potential solution to the issue, and each dimension in the Bat Algorithm's search space represents one of the basic parameters: skew, focal length, and magnification factor. …”
Get full text
Get full text
Get full text
Article -
2
A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm
Published 2013“…Each bat in Bat Algorithm represents a candidate solution for the problem and each dimension in the search space of the Bat Algorithm represents a parameter of intrinsic parameters: skew, focal length, and magnification factor. …”
Get full text
Get full text
Conference or Workshop Item -
3
A Hybrid Least Squares Support Vector Machine with Bat and Cuckoo Search Algorithms for Time Series Forecasting
Published 2020“…Evaluation was performed separately to further analyze the strength of Bat and Cuckoo Search to optimize LSSVM parameters. …”
Get full text
Get full text
Article -
4
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…The purpose of this research is to apply and evaluate the performance of Bat Algorithm for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…Nowadays, there are a lot of cryptography method has been applied. One of the most popular cryptography methods is Advance Encryption Standard (AES). …”
Get full text
Get full text
Thesis -
6
An improved chaotic image encryption algorithm
Published 2018“…Chaotic-based image encryption algorithms are countless in number. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
8
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…Secondly, a new dynamic encryption step method is proposed to solve the high correlation and deterministic problems in multiple S-box encryptions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
10
-
11
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
Get full text
Get full text
Thesis -
12
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…Experimental and statistical analyses show that, in comparison with the bat as well as variants of the bat and state-of-the-art algorithms, the proposed algorithm substantially outperforms them significantly, based on MSE and BER.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
15
-
16
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
17
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
Published 2018“…Thus, to protect the biometric templates it must be encrypted before storing in database. In this paper we proposed an efficient encryption method based on two invertible and random keys to enhance and overcome the weakness of hill cipher algorithm the keys generated using upper triangular matrices with Pseudo-Random Number Generator (PRNG) using two large and random encryption keys. …”
Get full text
Get full text
Get full text
Article -
18
Flood Routing in River Reaches Using a Three-Parameter Muskingum Model Coupled with an Improved Bat Algorithm
Published 2018“…The present study attempted to develop a three-parameter Muskingum model considering lateral flow for flood routing, coupling with a new optimization algorithm namely, Improved Bat Algorithm (IBA). …”
Get full text
Get full text
Article -
19
A hybrid method for data communication using encrypted audio steganography
Published 2024journal::journal article -
20
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item
