Search Results - (( evolution optimization path algorithm ) OR ( based encryption _ algorithm ))
Search alternatives:
- evolution optimization »
- optimization path »
- path algorithm »
-
1
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…Significant research has been conducted on Unmanned Aerial Vehicle (UAV) path planning using evolutionary algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), and Biogeographic-Based Optimization (BBO). …”
Get full text
Get full text
Thesis -
2
Development of an improved GWO algorithm for solving optimal paths in complex vertical farms with multi-robot multi-tasking
Published 2024“…The EPDE-GWO algorithm is compared with Genetic Algorithm (GA), Simulated Annealing (SA), Dung Beetle Optimizer (DBO), and Particle Swarm Optimization (PSO). …”
Get full text
Get full text
Get full text
Article -
3
-
4
Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim
Published 2007“…Roadways and telephone systems are the examples of them. Genetic Algorithms (GA), pioneered by John Holland, applies the principle of evolution found in nature to the problem of finding an optimal solution. …”
Get full text
Get full text
Thesis -
5
Differential evolution optimization for constrained routing in Wireless Mesh Networks
Published 2014“…This solution addresses efficient and optimal routing path construction for cost and quality metrics of the application. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…The purpose of this project is to implement FPGA Base Encryption Chip using DES algorithm. Throughout the project, the suitability of the implementation DES algorithm in FPGA will be investigated. …”
Get full text
Get full text
Monograph -
7
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
8
On the Computational Cost of Cocks’ Identity Based Encryption
Published 2018“…Unfortunately, lack of efficiency becomes a major drawback of the Cocks’ Identity Based Encryption. The algorithms in Cocks’ Identity Based Encryption consists of four stages: Setup, Extract, Encrypt and Decrypt. …”
Get full text
Get full text
Article -
9
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
10
Encryption selection for WLAN IEEE802.11G
Published 2013“…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
Get full text
Get full text
Thesis -
11
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital images. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
12
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
Get full text
Get full text
Thesis -
13
-
14
A novel image encryption using an integration technique of blocks rotation based on the Magic cube and the AES Algorithm
Published 2012“…In this paper proposes an encryption algorithm for a new image protection scheme based on the rotation of the faces of a Magic Cube. …”
Get full text
Get full text
Get full text
Article -
15
Image encryption algorithm based on chaotic mapping
Published 2003“…This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. …”
Get full text
Get full text
Get full text
Article -
16
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
17
Literature Review of Optimization Techniques for Chatter Suppression In Machining
Published 2011“…Various algorithms can be applied in the optimization of machining problems; however, Differential Evolution is the most appropriate for use in chatter suppression, being less time consuming, locally optimal, and more robust than both Genetic Algorithms, despite their wide applications, and Sequential Quadratic Programming, which is a famous conventional algorithm.…”
Get full text
Get full text
Get full text
Article -
18
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…Based on the research that had been conducted, it shows that the enhanced algorithm have managed to speed up the computational process for encryption and decryption of the text in the Android platform to reduce computational overhead. …”
Get full text
Get full text
Thesis -
19
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
An improved chaotic image encryption algorithm
Published 2018“…Chaotic-based image encryption algorithms are countless in number. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
