Search Results - a distribution ((selection algorithm) OR (((encryption algorithm) OR (function algorithm))))
Search alternatives:
- selection algorithm »
- function algorithm »
- a distribution »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…There are two components in our work. The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…The proposed algorithms include Development of Bit level Scrambling Encryption for Radio Telescope Imageries, Bit-levels Encryption for RGB Telescope Images, Bit-levels Encryption for RGB Telescope Images, Design of Encryption Algorithm in Combined Spatial and Frequency Domains for Telescope Grayscale and Bayer Images, and Combined Spatial and Frequency Domains in Algorithm of RGB Color Image Security for Telescope Images. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…The current parametric encryption algorithms suffer the unconventional and paranormal attacks. …”
Get full text
Get full text
Proceeding Paper -
4
Secured HF image transmission system
Published 2006“…For confidentiality, stream cipher algorithm used is based on the linear feedback register (LFSR) and a nonlinear combining function. …”
Get full text
Get full text
Monograph -
5
Levy tunicate swarm algorithm for solving numerical and real-world optimization problems
Published 2022“…The proposed Levy Tunicate Swarm Algorithm (LTSA) is a novel metaheuristic algorithm that integrates the Levy distribution into a new metaheuristic algorithm called Tunicate Swarm Algorithm (TSA) to solve numerical and real-world optimization problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Levy slime mould algorithm for solving numerical and engineering optimization problems
Published 2022“…The proposed Levy Slime Mould Algorithm (LSMA) is a novel metaheuristic algorithm that integrates the Levy distribution into a new metaheuristic called Slime Mould Algorithm (SMA) for solving numerical and engineering problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…In this work a feeder reconfiguration algorithm is presented for the purpose of power loss reduction in distribution networks. …”
Get full text
Get full text
Thesis -
8
Some metaheuristic algorithms for solving multiple cross-functional team selection problems
Published 2022“…We introduced a method that combines a compromise programming (CP) approach and metaheuristic algorithms, including the genetic algorithm (GA) and ant colony optimization (ACO), to solve the proposed optimization problem. …”
Get full text
Get full text
Article -
9
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
Article -
10
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
Get full text
Get full text
Get full text
Thesis -
11
Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability
Published 2024“…A Binary Clonal Selection Algorithm is being proposed to ensure optimal generation of the superior final neuron states. …”
Get full text
Get full text
Thesis -
12
A new secure storing system for biometric templates based encryption and concealment
Published 2015“…Therefore, storing biometric templates a secure way is crucial. This study proposes a novel approach that combines an improved encryption method with a new concealment technique to establish a secure data template storing system. …”
Get full text
Get full text
Get full text
Article -
13
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Thesis -
14
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Undergraduates Project Papers -
15
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
Get full text
Get full text
Thesis -
16
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is a data encryption technique that exist in the world with as currently the most secured algorithms. …”
Get full text
Get full text
Thesis -
17
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…It does not test most parts of a GUI within a reasonable amount of time and there is a high probability that the same actions are re-selected. …”
Get full text
Get full text
Article -
18
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The DPA-EHD is further modified by utilizing the pipelining parallelism to reduce the computing iterations and named as data parallel and pipelining algorithm (DPPA-EHD). To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
Get full text
Get full text
Thesis -
19
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. …”
Article -
20
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, propose an Optimized Time Sliding Window based Three Colour Marker. Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis
