Search Results - adoption using different ((encryption algorithm) OR (optimisation algorithm))*

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2

    An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography by Abomhara, Mohamed, Khalifa, Othman Omran, Zaidan , A. A., Zaidan , B. B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography by Abomhara, Mohamed, Khalifa, Othman O., Zaidan, A.A., Zaidan, B.B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Design Of Perturbative Hyper-Heuristics For Combinatorial Optimisation by Choong, Shin Siang

    Published 2019
    “…In order to explore the solution search space of a combinatorial optimisation problem, an approximation algorithm performs perturbations on the existing solutions by adopting a single or multiple perturbative Low-Level Heuristic(s) (LLHs). …”
    Get full text
    Get full text
    Thesis
  5. 5

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…Most research in the literature used fixed key expansion algorithm for encryption and decryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Modelling and optimisation of blood glucose control for type 1 diabetes using multi-parametric programming and model-based predictive control (mp-MPC) / Associate Professor Dr Ayub... by Md. Som, Ayub

    Published 2014
    “…Three simulation works are carried out using three different algorithms so as to refine the performance of the controller. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Passive congregation theory for particle swarm optimization (PSO): An application in reservoir system operation by Hossain M.S., Mohd Sidek L.B., Marufuzzaman M., Zawawi M.H.

    Published 2023
    “…The passive congregation theory of natural being's social behaviour is adopted to updated the standard PSO algorithm and used to develop and optimise a reservoir release policy for monthly basis. …”
    Article
  8. 8

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Hybrid genetic algorithm for uncapacitated university examination timetabling problem by Ishak, Suhada

    Published 2015
    “…All proposed algorithms are coded in C using Microsoft Visual C++ 6.0 as the compiler. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A hyper-heuristic based strategy for image segmentation using multilevel thresholding by Luqman, Fakhrud Din, Shah Khalid, Kamal Zuhairi Zamli, Aftab Alam

    Published 2025
    “…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  13. 13

    A hyper-heuristic based strategy for image segmentation using multilevel thresholding by Luqman, ., Fakhrud, Din, Shah, Khalid, Kamal Z., Zamli, Alam, Aftab

    Published 2025
    “…EMCQ uses four low-level heuristic sets adopted from the teaching learning-based optimisation (TLBO) algorithm, flower pollination algorithm (FPA), genetic algorithm (GA), and Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Gravitational energy harvesting system based on multistage braking technique for multilevel elevated car parking building by Al Kubaisi, Yasir Mahmood

    Published 2020
    “…The results showed that, 34.09% energy and 6.58% delay time have been improved using the proposed system and proposed optimised mass at 3.5 kg. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Modelling of optimized hybrid debris flow using airborne laser scanning data in Malaysia by Lay, Usman Salihu

    Published 2019
    “…Spearman Correlation was used to checked multi-collinearity effect on debris flow conditioning factors; evaluations factors of Information Value (IV), Crammer V were assessed.Wrapper feature subset selection technique was used, different metaheuristic search algorithms (e.g. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission by Bhattacharjee, S., Rahim, L.B.A., Watada, J., Roy, A.

    Published 2020
    “…It increases confidentiality and offers a backup for accidental data loss by combining the simplified data encryption standard (SDES) and an advanced pattern generation technique that uses a unique pattern generation table. …”
    Get full text
    Get full text
    Article