Search Results - (( java implication based algorithm ) OR ( using box ((method algorithm) OR (path algorithm)) ))

Refine Results
  1. 1

    Repetitive mutations in genetic algorithm for software test data generations by Kadhim, Mohammed Majid

    Published 2022
    “…Genetic Algorithm (GA) has proven to be an important method in generating test data for automatic path coverage testing. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score by Mirza Rizwan, Sajid

    Published 2021
    “…The methodology is proposed as stacking ensemble ML and the best ML algorithms are used as a base learner to compute relative feature weights. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Integration of Image Processing Algorithm and Path Planning for Search and Rescue Robot by Wong, Chun Yew

    Published 2017
    “…The focus of this project was to explore algorithms and techniques used in motion detection, object recognition and facial recognition, path finding as well as obstacle avoidance. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7

    Improving the security of LBlock lightweight algorithm using bit permutation by AlDabbagh, Sufyan Salim Mahmood, Alshaikhli, Imad Fakhri Taha

    Published 2013
    “…LBlock uses word permutation to do the diffusion while this research uses bit permutation to increase the number of active Substitution box (S-box). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Reconfigurable Stewart Platform for Spiral Contours by G. , Satheesh Kumar, T. , Nagarajan

    Published 2011
    “…The results obtained are to be validated for singularity-free path planning and attempt has to be made to estimate the computational efficiency of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  11. 11

    Designing substitution boxes based on chaotic map and globalized firefly algorithm by Ahmed, Hussam Alddin Shihab

    Published 2019
    “…For this reason, the research for a new metaheuristic based S-boxes generation is still a useful endeavour. This thesis aim to provide a new design for 8 × 8 S-boxes based on firefly algorithm (FA) optimization. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map by Alzaidi, Amer Awad, Ahmad, Musheer, Ahmed, Hussam S., Al Solami, Eesa

    Published 2018
    “…This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4 ≤ n ≤ 8) based on a recent optimization algorithm known as sine-cosine algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A new image encryption algorithm based on single S-box and dynamic encryption step by Wang, Ji Jun, Tan, Soo Fun

    Published 2021
    “…This paper presents an efficient and secure chaotic-based S-box image encryption scheme. Firstly, a single S-box with a size of 10 × 26 was constructed by using a low-dimensional chaotic system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Experiment
  15. 15

    High Accuracy Estimation Of Head Yaw Using Bounding Box Algorithm On A Vision Based System by Tarmizi, Aine Ilina

    Published 2020
    “…The percentage of accuracy of the yaw estimation using a bounding box algorithm is 92.4%. In addition, the yaw estimation was also able to identify the turning direction of the head (left or right). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…The use of non-linear S-Box is essential in preventing linear approximations that could lead to successful attacks, such as differential cryptanalysis. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20