Search Results - data distribution ((ant algorithm) OR (((encryption algorithm) OR (detection algorithm))))
Search alternatives:
-
1
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017“…The shortest distance is defined as best result. A set of data contains position of marbles is tested for ACO algorithm in the prototype. …”
Get full text
Get full text
Thesis -
2
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
Get full text
Get full text
Conference or Workshop Item -
3
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Thesis -
5
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Undergraduates Project Papers -
6
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is a data encryption technique that exist in the world with as currently the most secured algorithms. …”
Get full text
Get full text
Thesis -
7
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…This is useful for storing large amounts of data used in the cloud computing, the key distribution and authentication of the asymmetric encryption, speed, data integrity and data confidentiality of the symmetric encryption are also important also it enables to execute required computations on this encrypted data. � 2022 Institute of Advanced Engineering and Science. …”
Article -
8
Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks
Published 2009“…Among various works inspired by ant colonies, the Ant Colony Optimization (ACO) metaheuristic algorithms are the most successful and popular, e.g., AntNet, Multiple Ant Colony Optimization (MACO) and AntHocNet. …”
Get full text
Get full text
Thesis -
9
An Enhanced Ant Colony Optimisation Algorithm with the Hellinger Distance for Shariah-Compliant Securities Companies Bankruptcy Prediction
Published 2024“…The application of ant colony optimization (ACO) algorithms has been limited by their performance on imbalanced datasets, particularly within bankruptcy prediction where the some of bankruptcy cases lead to skewed data distributions. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
11
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
12
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…The overall accuracy of the Support Vector Machine SVM and Random Forest RF classifiers revealed that three of the six algorithms exhibited higher ranks in the landslide detection. …”
Get full text
Get full text
Get full text
Thesis -
13
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…As a route improvement strategy, two heuristics which are the swap among routes procedure and 3-opt algorithm are also employed within the ASH algorithm. …”
Get full text
Get full text
Thesis -
14
Chaos-based simultaneous compression and encryption for Hadoop
Published 2017“…Data compression and encryption are key components of commonly deployed platforms such as Hadoop. …”
Get full text
Get full text
Article -
15
-
16
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
Get full text
Get full text
Article -
17
-
18
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…During a security attack, the MTTD for the existing solution was very high because the existing scheme could not detect the attack. For the proposed scheme, the MTTD was very low which is 4.89 minutes, because of the consensus algorithm. …”
Get full text
Get full text
Thesis -
19
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…Additionally, the Latin square matrix stands out for its uniform histogram distribution, thereby bolstering its encryption's potency. …”
Get full text
Get full text
Get full text
Article -
20
Ant colony optimization for capacitated vehicle routing problem.
Published 2012“…The proposed ACO utilized a pheromone evaporation procedure of standard ant algorithm in order to introduce an evaporation rate that depends on the solutions found by the artificial ants. …”
Get full text
Get full text
Get full text
Article
