Search Results - _ distribution ((((function algorithm) OR (encryption algorithm))) OR (selection algorithm))
Search alternatives:
- selection algorithm »
- function algorithm »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…There are two components in our work. The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…The proposed algorithms include Development of Bit level Scrambling Encryption for Radio Telescope Imageries, Bit-levels Encryption for RGB Telescope Images, Bit-levels Encryption for RGB Telescope Images, Design of Encryption Algorithm in Combined Spatial and Frequency Domains for Telescope Grayscale and Bayer Images, and Combined Spatial and Frequency Domains in Algorithm of RGB Color Image Security for Telescope Images. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…The current parametric encryption algorithms suffer the unconventional and paranormal attacks. …”
Get full text
Get full text
Proceeding Paper -
4
Secured HF image transmission system
Published 2006“…For confidentiality, stream cipher algorithm used is based on the linear feedback register (LFSR) and a nonlinear combining function. …”
Get full text
Get full text
Monograph -
5
Levy tunicate swarm algorithm for solving numerical and real-world optimization problems
Published 2022“…Therefore, we used the Levy distribution rather than the conventional uniform distribution in the candidate selection procedure to solve the TSA algorithm local optima problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Levy slime mould algorithm for solving numerical and engineering optimization problems
Published 2022“…Therefore, for solving the SMA algorithm local optima problem, we used the Levy distribution rather than the conventional uniform distribution in the candidate selection procedure. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…Tests have shown that the differences are demonstrated only in execution time to arrive the best fitness function of the Genetic Algorithm. Whereas the results obtained from both selection methods are similar to each other. …”
Get full text
Get full text
Thesis -
8
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
Article -
9
Some metaheuristic algorithms for solving multiple cross-functional team selection problems
Published 2022“…We compared the developed algorithms with the MIQP-CPLEX solver on 500 programming contestants with 37 skills and several randomized distribution datasets. …”
Get full text
Get full text
Article -
10
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…The strategy’s key function is to select an action that may achieve new and desirable GUI states. …”
Get full text
Get full text
Get full text
Thesis -
11
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
Get full text
Get full text
Thesis -
12
Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability
Published 2024“…A Binary Clonal Selection Algorithm is being proposed to ensure optimal generation of the superior final neuron states. …”
Get full text
Get full text
Thesis -
13
A new secure storing system for biometric templates based encryption and concealment
Published 2015“…The Hill Cipher algorithm has been improved to be more secure by using a large and random key with large data block and also extending it to include the special characters. …”
Get full text
Get full text
Get full text
Article -
14
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Thesis -
15
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
Get full text
Get full text
Thesis -
17
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The DPA-EHD is further modified by utilizing the pipelining parallelism to reduce the computing iterations and named as data parallel and pipelining algorithm (DPPA-EHD). To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
Get full text
Get full text
Thesis -
18
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…The strategy’s key function is to select an action that may achieve new and desirable GUI states. …”
Get full text
Get full text
Article -
19
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
20
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. From the comparative study it was found that the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data encryption standard (3DES) algorithm with respect to the complexity, and output bytes. …”
Article
