Search Results - mode ((((optimization algorithm) OR (encryption algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Reusable data-path architecture for encryption-then-authentication on FPGA
Published 2023“…For this proposed reusable data-path, we have chosen LED algorithm for encryption and then PHOTON to generate the MAC code. …”
Article -
2
A parallel XTS encryption mode of operation
Published 2009“…Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Conference or Workshop Item -
3
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
Get full text
Get full text
Thesis -
4
Implementation of a parallel XTS encryption mode of operation
Published 2014“…Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Get full text
Article -
5
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…In addition, ISSA was compared with four well-known optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization, Grasshopper Optimization Algorithm, and Ant Lion Optimizer. …”
Get full text
Get full text
Article -
6
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
Get full text
Get full text
Thesis -
7
A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode
Published 2023“…A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode by Bahbibi Rahmatullah…”
Get full text
article -
8
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
9
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…The algorithm also supports two modes of operation namely EBC and CBC. …”
Get full text
Get full text
Article -
10
Image encryption algorithm based on chaotic mapping
Published 2003“…This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. …”
Get full text
Get full text
Get full text
Article -
11
Load shedding scheme for islanded distribution network with flexible load selection and power changes / Ja’far Saifeddin Abdelhafiz Jallad
Published 2018“…In order to realize the first aspect, a combination of particle swarm optimization (PSO) algorithm and firefly algorithm (FA) can be used to maximize the amount of remaining load and the voltage stability index (SI) in the distribution network. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
-
14
Secure lightweight client for cloud-based E-Health Model
Published 2023“…The implementation of the four features is described as follows: Firstly, the SCBEH model, which optimized a MONA benchmark model and absorbed all its security technologies, has four aspects to be considered: 1) the use of symmetric and asymmetric hybrid encryption technique (KEM-DEM), in which the latest elliptic curve cryptography algorithm (ECC) of asymmetric encryption is used; 2) the applications of group key distribution and group signature technologies are achieved; 3) the revocation and tracking of illegal group members are reimplemented; 4) the computational burden of client is alleviated. …”
Get full text
Get full text
Get full text
Thesis -
15
VHDL implementation of DES algorithm / Emmanvel Kajan Mering
Published 2004Get full text
Get full text
Thesis -
16
Hydraulic characterization of PVC-O pipes by means of transient tests
Published 2019“…The series of decomposition of signals is then carefully selected on where the supposed reflected intrinsic mode function (IMF). These IMFs that where being displayed by using a mathematical algorithm, that is known as Hilbert Transform (HT) spectrum. …”
Get full text
Get full text
Research Report -
17
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
18
Facial geometry and speech analysis for depression detection
Published 2017“…The proposed system has been tested both in gender independent and gender based modes, and with different fusion methods. The algorithms were evaluated for several combinations of parameters and classification schemes, on the dataset provided by the Audio/Visual Emotion Challenge of 2013 and 2014. …”
Get full text
Get full text
Article -
19
A new model for iris data set classification based on linear support vector machine parameter's optimization
Published 2020“…In this study, we proposed a newly mode for classifying iris data set using SVM classifier and genetic algorithm to optimize c and gamma parameters of linear SVM, in addition principle components analysis (PCA) algorithm was use for features reduction.…”
Get full text
Get full text
Get full text
Article -
20
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…Findings: The proposed FDA system is different from traditional fire alarm and detection system regarding topology as it manages a group of buildings optimally and efficiently. …”
Get full text
Get full text
Get full text
Article
