Search Results - (( adoption _ difference encryption algorithm ) OR ( adoption a difference evolution algorithm ))

Search alternatives:

Refine Results
  1. 1
  2. 2

    An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography by Abomhara, Mohamed, Khalifa, Othman Omran, Zaidan , A. A., Zaidan , B. B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography by Abomhara, Mohamed, Khalifa, Othman O., Zaidan, A.A., Zaidan, B.B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm by Al-Qazzaz, Noor Kamal, Sabir, Mohannad K., Md. Ali, Sawal Hamid, Ahmad, Siti Anom, Grammer, Karl

    Published 2019
    “…Furthermore, the right and left occipital channels may help in identifying happiness, sadness, surprise and neutral emotional states. The DEFS_Ch algorithm raised the linear discriminant analysis (LDA) classification accuracy from 80% to 86.85%, indicating that DEFS_Ch may offer a useful way for reliable enhancement of the detection of different emotional states of the brain regions.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A comparative study for parameter selection in online auctions by Gan, Kim Soon

    Published 2009
    “…In this work, three different models of genetic algorithms are considered. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem by Anniza, Hamdan, San Nah, Sze, Say Leng, Goh, Kang Leng, Chiew, Wei King, Tiong

    Published 2023
    “…The evolutionary algorithm has been extensively used to solve a range of combinatorial optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A hyper-heuristic based strategy for image segmentation using multilevel thresholding by Luqman, Fakhrud Din, Shah Khalid, Kamal Zuhairi Zamli, Aftab Alam

    Published 2025
    “…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Gradient-based mutation manta ray foraging optimization (gbm-mrfo) for solving constrained real-world problems by Ahmad Azwan, Abdul Razak, Ahmad Nor Kasruddin, Nasir

    Published 2022
    “…Gradient-based Mutation MRFO (GbM-MRFO) is derived from basic strategy of MRFO and synergized with the Gradient-based Mutation strategy. MRFO is a recently new introduced algorithm that consists of strategy of foraging adopted by Manta Ray while Gradient-based Mutation (GbM) is a feasibility-and solution repair strategy adopted from ϵ-Matrix-Adaptation Evolution Strategy (ϵ-MAES). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Channel quality indicator for long term evolution system based on adaptive threshold feedback compression scheme by Abdulhasan, Muntadher Qasim

    Published 2014
    “…This thesis proposes an adaptive feedback algorithm that uses a threshold scheme to enhance the system throughput while maintaining low Block Error Rate (BLER), Bit Error Rate (BER), and overhead. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A hyper-heuristic based strategy for image segmentation using multilevel thresholding by Luqman, ., Fakhrud, Din, Shah, Khalid, Kamal Z., Zamli, Alam, Aftab

    Published 2025
    “…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Delay-Aware Energy-Efficient Joint Power Control and Mode Selection in Device-to-Device Communications for FREEDM Systems in Smart Grids by Fauzun Abdullah Asuhaimi, Muhammad Ali Imran, Shengrong Bu, Joao Pedro Battistella Nadas

    Published 2024
    “…We propose a joint power control and mode selection scheme to deal with the problem and develop a brute-force-based algorithm to find the solutions. …”
    Article
  16. 16

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Enhancing clustering algorithm with initial centroids in tool wear region recognition by Kasim, Nur Adilla, Nuawi, Mohd Zaki, Abdul Ghani, Jaharah, Ngatiman, Nor Azazi, Che Haron, Che Hassan, Muhammad Rizal

    Published 2020
    “…The analysis threshold represents a natural-sorted input vector as Z-rot coefficient (RZ) corresponds to the number of cutting accomplish a strong correlation (R2 = 0.8511) over wear evolution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid by Khalid, Khairi

    Published 2017
    “…The adoption of a strategic approach is needed for planning and managing that flood management in any watershed. …”
    Get full text
    Get full text
    Thesis
  20. 20