بدائل البحث:
mesh algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
element » elements (توسيع البحث)
mesh algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
1
Axes-Based Encryption Key
منشور في 2018احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
2
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …"
-
3
A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes
منشور في 2022"…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …"
-
4
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
منشور في 2019الموضوعات: احصل على النص الكامل
article -
5
-
6
-
7
Development of an Optimization Algorithm for Internet Data Traffic
منشور في 2020"…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …"
احصل على النص الكامل
article -
8
-
9
Practical single node failure recovery using fractional repetition codes in data centers
منشور في 2016"…FR codes consist of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
10
-
11
-
12
A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
13
A Comparative Study of Elgamal Based Cryptographic Algorithms
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
14
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
منشور في 2024"…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …"
-
15
-
16
Predicting Patient ICU Readmission Using Recurrent Neural Networks With Long Short-Term Memory
منشور في 2025الموضوعات: -
17
-
18
-
19
-
20
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"