Search Results - (( adaptive a difference encryption algorithm ) OR ( adaptive k differential evolution algorithm ))
Search alternatives:
- differential evolution »
- evolution algorithm »
- k differential »
- a difference »
- adaptive a »
- adaptive k »
-
1
-
2
-
3
Ultra-short-term PV power forecasting based on a support vector machine with improved dragonfly algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
5
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009“…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Techno-economic evaluation of off-grid hybrid renewable energy system for rural resort electrification in Malaysia / Monowar Hossain
Published 2017“…For these purposes, the standalone ANFIS, ANFIS-PSO (particle swarm optimization),ANFIS-GA (genetic algorithm) and ANFIS-DE (differential evolution) prediction algorithms have been developed in MATLAB platform. …”
Get full text
Get full text
Thesis -
10
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
Published 2024“…An enhanced PRESENT encryption and an Elliptic-Curve Cryptography algorithm were adapted to achieve a lightweight authentication scheme, a necessity of the resource-constraint devices. …”
Get full text
Get full text
Get full text
Get full text
Thesis
