Search Results - (( adaptive make difference evolution algorithm ) OR ( adaptive a different encryption algorithm ))
Search alternatives:
- difference evolution »
- different encryption »
- evolution algorithm »
- make difference »
- adaptive make »
- a different »
- adaptive a »
-
1
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
2
Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy
Published 2018“…A trend that has emerged recently is to make the algorithm parameters automatically adapt to different problems during optimization, thereby liberating the user from the tedious and time-consuming task of manual setting. …”
Get full text
Get full text
Article -
3
A comparative study for parameter selection in online auctions
Published 2009“…In this work, three different models of genetic algorithms are considered. …”
Get full text
Get full text
Get full text
Thesis -
4
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
5
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009“…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
9
Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced
Published 2018“…The HHPO and the MC-HOD algorithms achieves significant enhancement compared to the conventional and other algorithms examined. …”
Get full text
Get full text
Thesis -
10
-
11
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
Published 2024“…An enhanced PRESENT encryption and an Elliptic-Curve Cryptography algorithm were adapted to achieve a lightweight authentication scheme, a necessity of the resource-constraint devices. …”
Get full text
Get full text
Get full text
Get full text
Thesis
