Search Results - (( based encryption path algorithm ) OR ( evolution optimization max algorithm ))
Search alternatives:
- evolution optimization »
- optimization max »
- path algorithm »
- max algorithm »
-
1
Performance comparison of differential evolution and particle swarm optimization in constrained optimization
Published 2012“…Particle swarm optimization (PSO) and differential evolution (DE) are among the well-known modern optimization algorithms. …”
Get full text
Get full text
Get full text
Article -
2
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…Two dynamic transmit antenna shuffling schemes, namely ‘Optimal’ and ‘Max STBC’, are proposed to enhance the V-BLAST/STBC transceiver scheme with LC-QR proposed in the first part. …”
Get full text
Get full text
Thesis -
3
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
4
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
5
Image orientation watermarking technique for copyright protection
Published 2016“…In return, a copyright gains its validity based on such robust characteristics. Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
Get full text
Get full text
Get full text
Thesis
