Search Results - different ((((equations algorithm) OR (selection algorithm))) OR (encryption algorithm))
Search alternatives:
- equations algorithm »
- selection algorithm »
-
1
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
2
Encryption selection for WLAN IEEE802.11G
Published 2013“…Thus, these different findings have motivated this research. As for the solution, it proposes a mechanism of selecting encryption algorithms, which is able to help users to select the suitable encryption algorithm and encryption protocols for their secured communication in IEEE 802.11g WLAN. …”
Get full text
Get full text
Thesis -
3
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. In this algorithm, the essential requirements of confusion and diffusion are accomplished, and a stochastic sequence is used to enhance the security of encrypted image. …”
Get full text
Get full text
Thesis -
4
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This discovery suggests that selecting appropriated algorithms for data encryption in different ranges of data size affects processing time supporting Medical Emergency System.…”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
6
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Book Section -
7
Message based random variable length key encryption algorithm.
Published 2009“…These processes repeated until whole mesaage get involved into the last cipher. Encrypted messages are not equal under different run. …”
Get full text
Get full text
Article -
8
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
Published 2023Conference Paper -
9
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
10
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
11
Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm
Published 2019“…This extension of Autometrics for model selection was also developed for multiple equations by integrating it with seemingly unrelated regressions equations (SURE) and estimated using feasible generalized least squares (FGLS), known as SURE-Autometrics algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…The development of Clonal Selection Algorithm (CSA) is inspired by elements from clonal selection theories. …”
Get full text
Get full text
Conference or Workshop Item -
13
A new stepsize for gradient method via weak secant equation
Published 2007“…The algorithm then selects the stepsizes along the negative gradient using a new approximation of the Hessian based on the weak secant equation. …”
Get full text
Conference or Workshop Item -
14
Enhancing selective encryption for H.264/AVC using advanced encryption standard
Published 2010“…The strength of the combination between Video compression and encryption science is due to the nonexistence of standard algorithms to be used in video compression and encrypting secret video stream. …”
Get full text
Get full text
Get full text
Article -
15
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
16
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
17
Performance Enhancement Of Artificial Bee Colony Optimization Algorithm
Published 2013“…To overcome the problems, this research work has proposed few modified and new ABC variants; Gbest Influenced-Random ABC (GRABC) algorithm systematically exploits two different mutation equations for appropriate exploration and exploitation of search-space, Multiple Gbest-guided ABC (MBABC) algorithm enhances the capability of locating global optimum by exploiting so-far-found multiple best regions of a search-space, Enhanced ABC (EABC) algorithm speeds up exploration for optimal-solutions based on the best so-far-found region of a search-space and Enhanced Probability-Selection ABC (EPS-ABC) algorithm, a modified version of the Probability-Selection ABC algorithm, simultaneously capitalizes on three different mutation equations for determining the global-optimum. …”
Get full text
Get full text
Thesis -
18
Quarter-sweep preconditioned relaxation method, algorithm and efficiency analysis for fractional mathematical equation
Published 2021“…The paper presents the formulation of the quarter-sweep finite difference scheme that is used to approximate the selected fractional mathematical equation. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…This descriptive-analytical was resolved using the formulation of the study such as point addition, point doubling and double-and-add algorithm. Kuwakado scheme (2018) had be summarized in key generation, encryption, and decryption algorithm. …”
Get full text
Get full text
Student Project -
20
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The parallel computing laboratory is configured for homogeneous systems using MATLAB Distributed Computing Server (MDCS) with Windows 7 operating system. The designed algorithms are implemented for EHD equations and their performance is evaluated by using different performance indicators. …”
Get full text
Get full text
Thesis
