Search Results - ((((extraction algorithm) OR (evolution algorithm))) OR (encryption algorithm))
Search alternatives:
- extraction algorithm »
- evolution algorithm »
-
1
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
A shift column different offset for better Rijndael security
Published 2009“…The secrecy of an encryption algorithm is measured in terms of the computational power and time required to extract the secret key. …”
Get full text
Get full text
Get full text
Article -
3
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
Get full text
Get full text
Thesis -
4
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
On the Computational Cost of Cocks’ Identity Based Encryption
Published 2018“…Unfortunately, lack of efficiency becomes a major drawback of the Cocks’ Identity Based Encryption. The algorithms in Cocks’ Identity Based Encryption consists of four stages: Setup, Extract, Encrypt and Decrypt. …”
Get full text
Get full text
Article -
6
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023“…Algorithms; Diodes; Extraction; Iterative methods; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Different evolutions; Differential Evolution; Diode modeling; Electromagnetism-like algorithm; Extracting parameter; Hybrid evolutionary algorithm; Photovoltaic model; Photovoltaic modules; Evolutionary algorithms…”
Conference Paper -
7
Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time
Published 2021“…This paper propose a Secured Modified Advanced Encryption Standard Algorithm with decreasing the rounds of Advanced Encryption Standard (AES) to 14 rounds in order to minimize encryption and decryption process time and increasing digital data security as well. …”
Get full text
Get full text
Get full text
Article -
8
Parameters extraction of double diode photovoltaic module's model based on hybrid evolutionary algorithm
Published 2023“…Algorithms; Diodes; Errors; Extraction; Iterative methods; Mean square error; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Differential evolution algorithms; Diode modeling; Electromagnetism-like algorithm; Fast convergence speed; Hybrid evolutionary algorithm; IV characteristics; Photovoltaic model; Root mean square errors; Evolutionary algorithms…”
Article -
9
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Hence, thoughtfully chosen and practically tested encryption algorithm must be performed to enhance the device efficiency and decrease the risk of sensitive data exposure. …”
Get full text
Get full text
Article -
10
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Extraction of photovoltaic module model's parameters using an improved hybrid differential evolution/electromagnetism-like algorithm
Published 2023“…Algorithms; Evolutionary algorithms; Mean square error; Optimization; Parameter estimation; Photovoltaic cells; Coefficient of determination; DEAM; Five parameters; Hybrid differential evolution; Improved differential evolutions; IV characteristics; Photovoltaic modules; Root mean square errors; Iterative methods; algorithm; artificial intelligence; electromagnetic method; error analysis; experimental study; photovoltaic system…”
Article -
12
Doctor-patient remote consultation system with secure medical images
Published 2022“…The result was recorded including the run time and encrypted image size. The final selection of the algorithms depended on the encryption size and computation speed. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Key generation technique based on triangular coordinate extraction for hybrid cubes
Published 2017“…In this study, we extend the hybrid cube encryption algorithm (HiSea) and our earlier Triangular Coordinate Extraction (TCE) technique for HC by increasing the complexity in the mathematical approaches. …”
Get full text
Get full text
Article -
14
A comparative study of evolutionary algorithms and adapting control parameters for estimating the parameters of a single-diode photovoltaic module's model
Published 2023“…Algorithms; Diodes; Errors; Iterative methods; Least squares approximations; Mean square error; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Coefficient of determination; Differential Evolution; Electromagnetism-like algorithm; Hybrid evolutionary algorithm; Photovoltaic; Photovoltaic modules; Root mean square errors; Single-diode models; Evolutionary algorithms; algorithm; comparative study; electromagnetic method; estimation method; experimental design; numerical method; parameterization; performance assessment; photovoltaic system…”
Article -
15
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
16
GPU-accelerated extractive multi-document text summarization using decomposition-based multi-objective differential evolution
Published 2025“…Multi-document text summarization is computationally intensive, mainly when employing complex optimization algorithms. The computational demands increase significantly due to the integration of complex optimization algorithms and the computationally expensive repair operator. …”
Get full text
Get full text
Get full text
Article -
17
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024Subjects:journal::journal article -
18
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
19
Chaotic encryption scheme for colour Image using 3D lorenz chaotic map and 3D chen system
Published 2024“…Chaos-based image encryption system is an encryption method that uses chaotic systems in encrypting digital images for the purpose of enhancing security. …”
Get full text
Get full text
Get full text
Article -
20
