Search Results - (( based encryption method algorithm ) OR ( using optimization steam algorithm ))

Refine Results
  1. 1

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…Nowadays, there are a lot of cryptography method has been applied. One of the most popular cryptography methods is Advance Encryption Standard (AES). …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    A new image encryption algorithm based on single S-box and dynamic encryption step by Wang, Ji Jun, Tan, Soo Fun

    Published 2021
    “…Secondly, a new dynamic encryption step method is proposed to solve the high correlation and deterministic problems in multiple S-box encryptions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Experiment
  6. 6
  7. 7

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys by Khalaf, Emad Taha, Mohammed, Muamer N., Kohbalan, Moorthy, Hasan, Raed Abdulkareem

    Published 2018
    “…Thus, to protect the biometric templates it must be encrypted before storing in database. In this paper we proposed an efficient encryption method based on two invertible and random keys to enhance and overcome the weakness of hill cipher algorithm the keys generated using upper triangular matrices with Pseudo-Random Number Generator (PRNG) using two large and random encryption keys. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Research on the security algorithm of reversible information hiding in communication encrypted image by Jijun, Wang, Soo, Fun Tan, Yi, Yuan

    Published 2021
    “…Considering the embedding capacity and the security of the algorithm, the paper proposes a reversible information hiding algorithm for encrypted images based on. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  14. 14
  15. 15

    Hydrothermal scheduling using genetic algorithm approach / Norehsan Ali by Ali, Norehsan

    Published 1998
    “…The GA developed, aim to obtained the optimized output of the Ps (steam plant) and PH (hydro plant) with minimum cost for the steam plant, since the generation cost for the hydro plant is absolutely free. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Cryptanalysis and design of chaos based image encryption schemes by Wong , Kuan Wai

    Published 2025
    “…Furthermore, we present a grayscale image encryption scheme utilizing a permutation-diffusion architecture, as well as a color image encryption scheme based on a genetic algorithm and the 2D-SHCM. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Neuro-Fuzzy and Particle Swarm Optimization based Model for the Steam and Cooling sections of a Cogeneration and Cooling Plant by Alemu Lemma, Tamiru, Rangkuti, Chalillullah, Mohd Hashim, Fakhruldin

    Published 2009
    “…Neuro-fuzzy approach trained by a sequence of optimization algorithms-Particle Swarm Optimization (PSO) followed by Back-Propagation (BP)-is used to develop models for the steam drum pressure, steam drum water level, steam flow rate and chilled water supply temperature. …”
    Get full text
    Conference or Workshop Item
  19. 19

    Combining Genetic Algorithm and Artificial Neural Network to optimize biomass steam power plant emission / Ahmad Razlan Yusoff and Ishak Abdul Aziz

    Published 2008
    “…Genetic Algorithm and Artificial Neural Network (GAANN) were used to analyze the real data taken from palm oil mill power plant. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images by Ting, Kung Chuang

    Published 2022
    “…The proposed algorithms include Development of Bit level Scrambling Encryption for Radio Telescope Imageries, Bit-levels Encryption for RGB Telescope Images, Bit-levels Encryption for RGB Telescope Images, Design of Encryption Algorithm in Combined Spatial and Frequency Domains for Telescope Grayscale and Bayer Images, and Combined Spatial and Frequency Domains in Algorithm of RGB Color Image Security for Telescope Images. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis