Search Results - adoption _ different ((((evolution algorithm) OR (encryption algorithm))) OR (selection algorithm))
Search alternatives:
- evolution algorithm »
- selection algorithm »
- adoption »
-
1
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
2
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
3
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
4
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…The spectral features were performed by employing the relative spectral powers of delta (δRP), theta (θRP), alpha (αRP), beta (βRP), and gamma (γRP). The differential evolution-based channel selection algorithm (DEFS_Ch) was computed to find the most suitable EEG channels that have the greatest efficacy for identifying the various emotional states of the brain regions. …”
Get full text
Get full text
Conference or Workshop Item -
5
A comparative study for parameter selection in online auctions
Published 2009“…In this work, three different models of genetic algorithms are considered. …”
Get full text
Get full text
Get full text
Thesis -
6
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
7
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…However, the learning complexity of classification is increased due to the expansion number of learning model. Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
9
Delay-Aware Energy-Efficient Joint Power Control and Mode Selection in Device-to-Device Communications for FREEDM Systems in Smart Grids
Published 2024“…We propose a joint power control and mode selection scheme to deal with the problem and develop a brute-force-based algorithm to find the solutions. …”
Article -
10
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
Get full text
Get full text
Thesis -
11
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
12
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid
Published 2017“…There were two sets of algorithms in developing the UPLRB ANN model and every algorithm set consisted of model inputs data preparation, neural network script and neural network error checking measures. …”
Get full text
Get full text
Thesis -
14
An observation of different clustering algorithms and clustering evaluation criteria for a feature selection based on linear discriminant analysis
Published 2022“…When the Gaussian mixture distribution algorithm is adopted, none of the criteria can consistently select features with the least number. …”
Get full text
Get full text
Get full text
Book Chapter -
15
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
16
Review of Nature Inspired Metaheuristic Algorithm Selection for Combinatorial t-way Testing
Published 2022“…However, not all metaheuristics are effectively adopted in combinatorial t-way testing, some proved to be effective and thus have been popular tools selected for optimization whilst others are not adopted. …”
Get full text
Get full text
Article -
17
Zebra optimization algorithm for feature selection
Published 2026“…This algorithm is adopted by inspiring the social behavior and movements strategies of zebras in wildlife. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
Published 2012“…Such findings and others presented in this work lead to the building of efficient ECCs that satisfies different applications.…”
Get full text
Get full text
Thesis -
19
Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem
Published 2023“…Research works published from the year 2018 to 2022 are identified in terms of problem representation and evolutionary strategies adopted. The mechanisms and strategies used in evolutionary algorithms to address different types of combinatorial optimization problems are discovered. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission
Published 2020“…Moreover, multiple executions of distinct security algorithms for maintaining confidentiality and integrity reduce throughput and add a large number of additional bits as security overhead that hampers the robustness against data loss. …”
Get full text
Get full text
Article
