بدائل البحث:
image encryption » image generation (توسيع البحث)
code selection » gene selection (توسيع البحث)
يعرض 1 - 17 نتائج من 17 نتيجة بحث عن '(( code selection algorithm ) OR ( image encryption algorithm ))*', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1

    A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes حسب Temadher Alassiry Al-Maadeed (14147847)

    منشور في 2022
    "…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …"
  2. 2

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer حسب M. Z. Yildiz (16855476)

    منشور في 2019
    "…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
  3. 3

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group حسب Iqtadar Hussain (14147850)

    منشور في 2023
    "…To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</p><h2>Other Information</h2><p dir="ltr">Published in: Computational and Applied Mathematics<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s40314-023-02208-x" target="_blank">https://dx.doi.org/10.1007/s40314-023-02208-x</a></p>…"
  4. 4

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data حسب Behrouz Ahadzadeh (19757022)

    منشور في 2024
    "…To overcome these challenges, a new FS algorithm named Uniform-solution-driven Binary Feature Selection (UniBFS) has been developed in this study. …"
  5. 5

    Minimum traffic inter-BS SHO boundary selection algorithm for CDMA-based wireless networks حسب Abu-Amara, M.

    منشور في 2004
    "…An algorithm is presented to select an inter-base station soft handoff (inter-BS SHO) boundary for code division multiple access (CDMA)-based wireless networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    Large language models for code completion: A systematic literature review حسب Rasha Ahmad Husein (19744756)

    منشور في 2024
    "…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
  7. 7

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators حسب Abu Zitar, Raed

    منشور في 2021
    "…DNA microarray technology is the fabrication of a single chip to contain a thousand genetic codes. Each microarray experiment can analyze many thousands of genes in parallel. …"
    احصل على النص الكامل
  8. 8
  9. 9

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. Furthermore, encrypting the same amount of information in images of varying sizes resulted in approximately 6.77 percent improvements. …"
  10. 10

    Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System حسب Mohd Imran (12249782)

    منشور في 2025
    "…Our main contribution includes: (a) Secure template generation by Mobius transformation using user keyset (p, q), (b) Securing the user template using permutation and encryption operation. The analysis of security and matching performance of the proposed preservation scheme has been evaluated against publicly available fingerprint database FVC2000 DB1, FVC2000 DB2, FVC2002 DB1, FVC2002 DB3, FVC2004 DB1 and FVC2004 DB3 containing 800 images of 100 persons, 8 images per person in each database using FMR, FAR, GAR, ROC Curve, and EER parameters. …"
  11. 11
  12. 12

    COMPUTER AIDED PROGRAMMING EDUCATION (CAPE) حسب Al-Sukairi, Abdallah

    منشور في 2020
    "…CAPE consists of problem definition and algorithm construction modules. Algorithm construction module is currently supported with a facility to map an algorithm(s) into FORTRAN or Pascal code. …"
    احصل على النص الكامل
    article
  13. 13

    UML-based regression testing for OO software حسب Mansour, Nashat

    منشور في 2010
    "…Previous techniques have been mainly code-based and several of them have addressed procedural programs. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 14

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…<p>The non-linear property of Chaos is a promising approach to information security, and many accomplishments have been made by combining Chaos with several sub-security domains, including chaos-based stream ciphers, block ciphers, image encryption, and hash functions. Most Chaos-based hash functions are insecure or inefficient due to their dependence on complex, attacked multi-dimensional maps or uncertain, weak one-dimensional maps like logistic and tent. …"
  15. 15
  16. 16

    Secure and Anonymous Communications Over Delay Tolerant Networks حسب Spiridon Bakiras (16896408)

    منشور في 2020
    "…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …"
  17. 17

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article