Search Results - different ((encryption algorithm) OR (((evolution algorithm) OR (selection algorithm))))
Search alternatives:
- evolution algorithm »
- selection algorithm »
-
1
Encryption selection for WLAN IEEE802.11G
Published 2013“…Thus, these different findings have motivated this research. As for the solution, it proposes a mechanism of selecting encryption algorithms, which is able to help users to select the suitable encryption algorithm and encryption protocols for their secured communication in IEEE 802.11g WLAN. …”
Get full text
Get full text
Thesis -
2
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This discovery suggests that selecting appropriated algorithms for data encryption in different ranges of data size affects processing time supporting Medical Emergency System.…”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
4
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Book Section -
5
Broadening selection competitive constraint handling algorithm for faster convergence
Published 2020“…The median convergence traces have been compared with two different algorithms based on differential evolution, i:e: Ensemble of Constraint Handling Techniques (ECHT) and Stochastic Ranking Differential Evolution (SRDE). …”
Get full text
Get full text
Article -
6
Message based random variable length key encryption algorithm.
Published 2009“…These processes repeated until whole mesaage get involved into the last cipher. Encrypted messages are not equal under different run. …”
Get full text
Get full text
Article -
7
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
Published 2023Conference Paper -
8
Development of a novel component carrier selection algorithm in long term evolution-advanced (LTE-A) with carrier aggregation
Published 2017“…It was shown via simulation that the proposed algorithm can significantly improve the downlink LTE-Advanced performance as compared to the conventional CC selection algorithms.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
10
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
11
An improved component carrier selection algorithm for downlink long term evolution advanced
Published 2014“…Given that there are multiple CCs available, an efficient CC selection algorithm is necessary in order to assign a CC to each LTE user. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Investigations of component carrier selection algorithms in long term evolution-advanced
Published 2018“…Since the inter-band non-contiguous carrier aggregation is likely to be used due to the current frequency allocation, this paper provides a performance study of a number of CC selection algorithms for use in the inter-band non-contiguous downlink LTE-A. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Global optimal analysis of variant genetic operations in solar tracking
Published 2023“…Genetic Algorithms (GAs), Evolution Strategies (ES), Evolutionary Programming (EP) and Genetic Programming (GP) are some of the best known types of Evolutionary Algorithm (EA)where it is a class of global search algorithms inspired by natural evolution. …”
Article -
14
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…The development of Clonal Selection Algorithm (CSA) is inspired by elements from clonal selection theories. …”
Get full text
Get full text
Conference or Workshop Item -
15
Multiobjective optimization of bioethanol production via hydrolysis using hopfield- enhanced differential evolution
Published 2014“…In this chapter, the weighted sum scalarization approach is used in conjunction with three meta-heuristic algorithms: Differential Evolution (DE), Hopfield-Enhanced Differential Evolution (HEDE), and Gravitational Search Algorithm (GSA). …”
Get full text
Get full text
Book -
16
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Differential evolution (DE) is a simple yet powerful evolutionary algorithm (EA). …”
Get full text
Get full text
Thesis -
17
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
19
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…The Genetic Algorithm is an area in the field of Artificial Intelligence that is founded on the principles of biological evolution. …”
Get full text
Get full text
Thesis -
20
Developing a hybrid model for accurate short-term water demand prediction under extreme weather conditions: a case study in Melbourne, Australia
Published 2024“…Hybrid model development included the optimization of ANN coefficients (its weights and biases) using adaptive guided differential evolution algorithm. Post-optimization ANN model was trained using eleven different leaning algorithms. …”
Article
