Search Results - addition make difference ((evolution algorithm) OR (encryption algorithm))
Search alternatives:
- evolution algorithm »
- make difference »
-
1
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The issue of misplaced pixel positions in the image was also adequately addressed, making it an effective method for image encryption. …”
Get full text
Get full text
Get full text
Article -
2
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The DNA-based MixColumns operation functions as a pseudo-random number generator, generating an encrypted random number for the purpose of encryption. …”
Get full text
Get full text
Thesis -
3
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…This descriptive-analytical was resolved using the formulation of the study such as point addition, point doubling and double-and-add algorithm. …”
Get full text
Get full text
Student Project -
4
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
5
-
6
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In multi hop communication, the Cluster Head (CH) has to send the aggregated data to one hop away neighbor cluster head either it is far away or near to the sink, while in a single hop it makes a difference. Due to many-to-one data routing pattern, lack of energy consumption management will results early loss of CH’s energy in sink vicinity, which leads to a routing hole problem. …”
Get full text
Get full text
Thesis -
7
A novel framework for secure cryptocurrency transactions using quantum crypto guard
Published 2025“…However, the rise of quantum computing poses significant threats to their security, as traditional cryptographic methods may be easily compromised. In addition, the existing algorithms face difficulties like slow transaction speeds, interoperability issues between different cryptocurrencies, and privacy concerns. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…IoT devices, such as smartphones and tablets, have a limited network, computation, and storage capacity, making them more vulnerable to attacks. In addition, the huge volume of data generated by IoT devices remains an open challenge for existing platforms to process, analyze, and discover underlying trends to create a convenient environment. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
End to end performance analysis over IP RAN network / Armi Shahran Mohamad
Published 2011“…For future research, similar scientific analysis will be deploy on Long Term Evolution Network (4G) which is focusing on scheduling algorithms in different traffic conditions such as VoIP and Mix Traffic (Web Browsing, FTP & Steaming).…”
Get full text
Get full text
Thesis -
10
