Search Results - (( developing rate encryption algorithm ) OR ( java data optimization algorithm ))
Search alternatives:
- data optimization »
- developing rate »
- rate encryption »
- java »
-
1
Video encryption using computation between H.264/AVC and AES encryption algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
2
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
Published 2006“…With implementation on Altera’s APEX FPGA, experimental evaluation of the AES Crypto-Processor running at 50 MHz using test vector provided in FIPS (2002) yields an average encryption rate at 188.24 Mb/s and decryption rate at 200 Mb/s which makes the overall performance is at 192.12 Mb/s. …”
Get full text
Get full text
Thesis -
3
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
4
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…The proposed encryption scheme FHE is performed on the encrypted ECG data where FHE can be applied in any system by using a various public key algorithm. …”
Get full text
Get full text
Article -
5
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
7
Feasibility of quantum cryptography with AES for secure communication
Published 2026“…Traditional encryption techniques face serious threats from the rapid development of quantum computing, which could soon compromise many classical algorithms. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Asynchronous point to point FSK- FM radio telemetry system with data encryption for monitoring environmental conditions / Shuhaimi Shamsuddin
Published 2003“…A software programming based on LabVIEW was developed for data processing and presentation. The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. …”
Get full text
Get full text
Thesis -
9
Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor
Published 2013“…Then, cryptosystem algorithm based on Hill Cipher and random number is implemented as encryption and decryption techniques as protection for registered users as stored in the database. …”
Get full text
Get full text
Thesis -
10
A random search based effective algorithm for pairwise test data generation
Published 2011“…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
12
EasyA: Easy and effective way to generate pairwise test data
Published 2013“…This paper proposes a matrix based calculation for pairwise test data generation algorithm named EasyA to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
15
Proposed method for enhancing quantum bit error rate using quantum key distribution technique
Published 2014“…This paper is proposed to provide a way for solving the key transmission issues using qkd, as a new method, by providing two quantum channels to improve qber. In addition also to develop an algorithm for integrating pki and qkd in solving the secrete key sharing issues in grid environment. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
A study of watermarking methods in medical application
Published 2004“…Among these three methods, LSB method has the most capacity of watermark and fastest rate in embedding process. These three algorithms implemented in this project are shown to be sensitive for the attack. …”
Get full text
Get full text
Thesis -
18
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
Article -
19
Secure radio telemetry and data acquisition using wireless data communication system with portable UHF transceivers / Mohd Dani Baba and Deepak Kumar Ghodgaonkar
Published 2003“…These algorithms are chosen because they are suitable for low bit rate data. …”
Get full text
Get full text
Research Reports -
20
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis
