Search Results - different ((((selection algorithm) OR (encryption algorithm))) OR (optimization algorithm))
Search alternatives:
- selection algorithm »
-
1
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
Published 2023Conference Paper -
2
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…The development of Clonal Selection Algorithm (CSA) is inspired by elements from clonal selection theories. …”
Get full text
Get full text
Conference or Workshop Item -
3
Encryption selection for WLAN IEEE802.11G
Published 2013“…Thus, these different findings have motivated this research. As for the solution, it proposes a mechanism of selecting encryption algorithms, which is able to help users to select the suitable encryption algorithm and encryption protocols for their secured communication in IEEE 802.11g WLAN. …”
Get full text
Get full text
Thesis -
4
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This discovery suggests that selecting appropriated algorithms for data encryption in different ranges of data size affects processing time supporting Medical Emergency System.…”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
6
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017“…This research proposes an efficient combination of a compression and an encryption algorithms. Two-Dimension Set Partitioning in Hierarchical Tree (2D-SPIHT) used to optimally compress signals then combined with recently lightweight encryption algorithm, namely Secure IoT (SIT). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Book Section -
8
Reusable data-path architecture for encryption-then-authentication on FPGA
Published 2023“…For this proposed reusable data-path, we have chosen LED algorithm for encryption and then PHOTON to generate the MAC code. …”
Article -
9
Message based random variable length key encryption algorithm.
Published 2009“…These processes repeated until whole mesaage get involved into the last cipher. Encrypted messages are not equal under different run. …”
Get full text
Get full text
Article -
10
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
Get full text
Get full text
Final Year Project -
11
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
12
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
13
An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection
Published 2012“…This paper presents the design of algorithm solution for selecting a planting lining technique. …”
Get full text
Get full text
Conference or Workshop Item -
14
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…In addition, ISSA was compared with four well-known optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization, Grasshopper Optimization Algorithm, and Ant Lion Optimizer. …”
Get full text
Get full text
Article -
15
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…—Whale Optimization Algorithm (WOA) and Grey Wolf Optimizer (GWO) are well-perform metaheuristic algorithms used by various researchers in solving feature selection problems. …”
Get full text
Get full text
Article -
16
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…Whale Optimization Algorithm (WOA) and Grey Wolf Optimizer (GWO) are well-perform metaheuristic algorithms used by various researchers in solving feature selection problems. …”
Get full text
Get full text
Article -
17
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
18
An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM)
Published 2024“…The second is the optimization of the best selected machine learning algorithms to further improve the efficiency and efficacy of the prediction. …”
Get full text
Get full text
Thesis -
19
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
Get full text
Conference or Workshop Item -
20
Zebra optimization algorithm for feature selection
Published 2026“…In this paper, we proposed the use of Zebra Optimization Algorithm (ZOA) for handling task regarding feature selection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
