Search Results - selection _ different ((evolution algorithm) OR (encryption algorithm))
Search alternatives:
- evolution algorithm »
- selection »
-
1
Encryption selection for WLAN IEEE802.11G
Published 2013“…Thus, these different findings have motivated this research. As for the solution, it proposes a mechanism of selecting encryption algorithms, which is able to help users to select the suitable encryption algorithm and encryption protocols for their secured communication in IEEE 802.11g WLAN. …”
Get full text
Get full text
Thesis -
2
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
3
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Book Section -
4
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This discovery suggests that selecting appropriated algorithms for data encryption in different ranges of data size affects processing time supporting Medical Emergency System.…”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Enhancing selective encryption for H.264/AVC using advanced encryption standard
Published 2010“…Also there are many ways could be used in video encryption methods such as combining several different encryption methods with video compression to pass a secret video streaming. …”
Get full text
Get full text
Get full text
Article -
6
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
Published 2023Conference Paper -
7
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
8
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
9
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
10
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
11
Broadening selection competitive constraint handling algorithm for faster convergence
Published 2020“…The median convergence traces have been compared with two different algorithms based on differential evolution, i:e: Ensemble of Constraint Handling Techniques (ECHT) and Stochastic Ranking Differential Evolution (SRDE). …”
Get full text
Get full text
Article -
12
Message based random variable length key encryption algorithm.
Published 2009“…These processes repeated until whole mesaage get involved into the last cipher. Encrypted messages are not equal under different run. …”
Get full text
Get full text
Article -
13
Development of a novel component carrier selection algorithm in long term evolution-advanced (LTE-A) with carrier aggregation
Published 2017“…It was shown via simulation that the proposed algorithm can significantly improve the downlink LTE-Advanced performance as compared to the conventional CC selection algorithms.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
An improved component carrier selection algorithm for downlink long term evolution advanced
Published 2014“…Given that there are multiple CCs available, an efficient CC selection algorithm is necessary in order to assign a CC to each LTE user. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…However, most of the existing embedding algorithms are incapable of overcoming the adverse effects of the challenges simultaneously. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Investigations of component carrier selection algorithms in long term evolution-advanced
Published 2018“…Since the inter-band non-contiguous carrier aggregation is likely to be used due to the current frequency allocation, this paper provides a performance study of a number of CC selection algorithms for use in the inter-band non-contiguous downlink LTE-A. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Multiobjective optimization of bioethanol production via hydrolysis using hopfield- enhanced differential evolution
Published 2014“…In this chapter, the weighted sum scalarization approach is used in conjunction with three meta-heuristic algorithms: Differential Evolution (DE), Hopfield-Enhanced Differential Evolution (HEDE), and Gravitational Search Algorithm (GSA). …”
Get full text
Get full text
Book -
19
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
A survey of component carrier selection algorithms for carrier aggregation in long term evolution-advanced
Published 2017“…It can be concluded from the study that the CC selection algorithms for newly-arrived LTE users can benefit from the channel diversity and the load status whereas the carrier aggregation that does not allocate all of the available CCs to the newly arrived LTE-A users shown to be more efficient.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
