Search Results - (( adaptive _ difference encryption algorithm ) OR ( adaptive k different optimisation algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2
  3. 3

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. There are two types of security for the new cryptosystem that we are concerned which are the security of Lucas function and its security against an adaptive chosen ciphertext attack. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    EEG-based emotion recognition using machine learning algorithms by Lam, Yee Wei

    Published 2024
    “…Throughout this research study, models like Support Vector Machine (SVM), K-Nearest Neighbours (KNN) and Adaptive Boosting (AdaBoost) will be explored. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Techno-economic impact analysis for renewable energy-based hydrogen storage integrated grid electric vehicle charging stations in different potential locations of Malaysia by Roslan M.F., Ramachandaramurthy V.K., Mansor M., Mokhzani A.S., Jern K.P., Begum R.A., Hannan M.A.

    Published 2025
    “…The results demonstrated favourable outcomes, with the total Net Present Cost (NPC) ranging from $1.4 million to $3.4 million across all locations, and the Cost of Energy (COE) ranging from $0.03/kWh to $0.16/kWh. These findings suggest that the optimization methodology is adaptable for implementation in diverse locations with different meteorological conditions. …”
    Article
  9. 9

    A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System by Chiadighikaobi, Ikenna Rene

    Published 2024
    “…An enhanced PRESENT encryption and an Elliptic-Curve Cryptography algorithm were adapted to achieve a lightweight authentication scheme, a necessity of the resource-constraint devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10