Search Results - (( based encryption method algorithm ) OR ( pattern classification modified algorithm ))
Search alternatives:
- classification modified »
- pattern classification »
- encryption method »
- method algorithm »
-
1
A modified fuzzy min-max neural network with a genetic-algorithm-based rule extractor for pattern classification
Published 2010“…The first stage consists of a modified fuzzy min-max (FMM) neural-network-based pattern classifier, while the second stage consists of a genetic-algorithm (GA)-based rule extractor. …”
Get full text
Article -
2
A hybrid-based modified adaptive fuzzy inference engine for pattern classification
Published 2011“…The Neuro-Fuzzy hybridization scheme has become of research interest in pattern classification over the past decade. The present paper proposes a hybrid Modified Adaptive Fuzzy Inference Engine (MAFIE) for pattern classification. …”
Get full text
Get full text
Conference or Workshop Item -
3
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…Nowadays, there are a lot of cryptography method has been applied. One of the most popular cryptography methods is Advance Encryption Standard (AES). …”
Get full text
Get full text
Thesis -
4
An improved chaotic image encryption algorithm
Published 2018“…Chaotic-based image encryption algorithms are countless in number. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
6
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…Secondly, a new dynamic encryption step method is proposed to solve the high correlation and deterministic problems in multiple S-box encryptions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
8
-
9
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
Get full text
Get full text
Thesis -
10
Modified word representation vector based scalar weight for contextual text classification
Published 2024“…In addition, a contextual text classification experiment is conducted using benchmarked datasets to assess the performance of the modified word vectors in the targeted classification task. …”
Get full text
Get full text
Thesis -
11
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
12
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
13
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
Published 2018“…Thus, to protect the biometric templates it must be encrypted before storing in database. In this paper we proposed an efficient encryption method based on two invertible and random keys to enhance and overcome the weakness of hill cipher algorithm the keys generated using upper triangular matrices with Pseudo-Random Number Generator (PRNG) using two large and random encryption keys. …”
Get full text
Get full text
Get full text
Article -
14
A hybrid method for data communication using encrypted audio steganography
Published 2024journal::journal article -
15
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…That is, to use training speech patterns to generate classification rules that can be used later to classify input words patterns. …”
Get full text
Get full text
Thesis -
16
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
17
Research on the security algorithm of reversible information hiding in communication encrypted image
Published 2021“…Considering the embedding capacity and the security of the algorithm, the paper proposes a reversible information hiding algorithm for encrypted images based on. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
18
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis -
19
Cryptanalysis and design of chaos based image encryption schemes
Published 2025“…Furthermore, we present a grayscale image encryption scheme utilizing a permutation-diffusion architecture, as well as a color image encryption scheme based on a genetic algorithm and the 2D-SHCM. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. …”
Get full text
Get full text
Get full text
Article
