Search Results - adoption a different ((optimisation algorithm) OR (encryption algorithm))
Search alternatives:
- optimisation algorithm »
- a different »
- adoption a »
-
1
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
2
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…In this paper, we design a new selective video encryption based on H.264/AVC and AES. …”
Get full text
Get full text
Get full text
Article -
3
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…In this paper, we design a new selective video encryption based on H.264/AVC and AES. …”
Get full text
Get full text
Get full text
Article -
4
Design Of Perturbative Hyper-Heuristics For Combinatorial Optimisation
Published 2019“…In order to explore the solution search space of a combinatorial optimisation problem, an approximation algorithm performs perturbations on the existing solutions by adopting a single or multiple perturbative Low-Level Heuristic(s) (LLHs). …”
Get full text
Get full text
Thesis -
5
Passive congregation theory for particle swarm optimization (PSO): An application in reservoir system operation
Published 2023“…Particle swarm optimisation (PSO) is a very well-known method and has a strong background in optimisation filed to solve different non-linear, complex problems especially in creating the reservoir release policies. …”
Article -
6
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
Get full text
Get full text
Thesis -
7
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
8
Hybrid genetic algorithm for uncapacitated university examination timetabling problem
Published 2015“…The main components of the genetic operators in a Genetic Algorithm (GA) will be tested and the best combination of the genetic operators will be adopted to construct a Pure Genetic Algorithm (PGA). …”
Get full text
Get full text
Thesis -
9
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Modelling and optimisation of blood glucose control for type 1 diabetes using multi-parametric programming and model-based predictive control (mp-MPC) / Associate Professor Dr Ayub...
Published 2014“…This research attempts to develop a new control algorithm to regulate the blood glucose level (BGL) for Type 1 Diabetes. …”
Get full text
Get full text
Monograph -
11
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…This combination provides a secure key management mechanism and data hiding to provide strong encryption and decryption standards. …”
Get full text
Get full text
Thesis -
13
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
14
-
15
-
16
-
17
Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data
Published 2019“…Grid search method was adopted to optimise the hyperparameters of the investigated base models. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Gravitational energy harvesting system based on multistage braking technique for multilevel elevated car parking building
Published 2020“…Thirdly, modeling of electrical and mechanical parameters for the presented system such that the system performance matching the model, this process is performed by using a parameter optimization algorithm. For this purpose, the experimental measurements of the (GEH) structure conducted under different weights and different scenarios of operations, with and without braking mechanism. …”
Get full text
Get full text
Thesis -
20
Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission
Published 2020“…It increases confidentiality and offers a backup for accidental data loss by combining the simplified data encryption standard (SDES) and an advanced pattern generation technique that uses a unique pattern generation table. …”
Get full text
Get full text
Article
