Search Results - (( adoption two different evolution algorithm ) OR ( adoption a difference encryption algorithm ))
Search alternatives:
- different evolution »
- evolution algorithm »
- two different »
- adoption two »
- a difference »
- adoption a »
-
1
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
2
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…In this paper, we design a new selective video encryption based on H.264/AVC and AES. …”
Get full text
Get full text
Get full text
Article -
3
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…In this paper, we design a new selective video encryption based on H.264/AVC and AES. …”
Get full text
Get full text
Get full text
Article -
4
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
Get full text
Get full text
Thesis -
5
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
6
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…The Savitzky-Golay (SG) filter was adopted for smoothing and denoising the EEG dataset. …”
Get full text
Get full text
Conference or Workshop Item -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…This combination provides a secure key management mechanism and data hiding to provide strong encryption and decryption standards. …”
Get full text
Get full text
Thesis -
9
Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem
Published 2023“…Research works published from the year 2018 to 2022 are identified in terms of problem representation and evolutionary strategies adopted. The mechanisms and strategies used in evolutionary algorithms to address different types of combinatorial optimization problems are discovered. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
Channel quality indicator for long term evolution system based on adaptive threshold feedback compression scheme
Published 2014“…The percentage difference is 2.1%,compared with the full feedback method, with only 0.5% degradation. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…In order to estimate the quality of ‘pruned’ features, self-adaptive DE algorithm is proposed. Two parameters (population size and generation numbers) are adaptively adopted from number of remaining ranking features. …”
Get full text
Get full text
Thesis -
15
Delay-Aware Energy-Efficient Joint Power Control and Mode Selection in Device-to-Device Communications for FREEDM Systems in Smart Grids
Published 2024“…We adopt a D2D-assisted relaying framework to assist links that meet poor channel conditions in order to increase the data rate of intelligent energy management devices with large size report. …”
Article -
16
Robust Portfolio Mean-Variance Optimization for Capital Allocation in Stock Investment Using the Genetic Algorithm: A Systematic Literature Review
Published 2024journal::journal article -
17
SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid
Published 2017“…SWAT-CUP, which links SUFI-2 algorithm to SWAT models, has been utilized in the study for the calibration of SWAT models. …”
Get full text
Get full text
Thesis -
18
Enhancing clustering algorithm with initial centroids in tool wear region recognition
Published 2020“…The analysis threshold represents a natural-sorted input vector as Z-rot coefficient (RZ) corresponds to the number of cutting accomplish a strong correlation (R2 = 0.8511) over wear evolution. The clustering system adopted a new calculation of initial centroids has successfully determined the three regions for only a single assignment and achieving the optimal distance squared through eight given data sets. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission
Published 2020“…It increases confidentiality and offers a backup for accidental data loss by combining the simplified data encryption standard (SDES) and an advanced pattern generation technique that uses a unique pattern generation table. …”
Get full text
Get full text
Article
