بدائل البحث:
image encryption » image generation (توسيع البحث)
node selection » gene selection (توسيع البحث)
يعرض 1 - 20 نتائج من 24 نتيجة بحث عن '(( node selection algorithm ) OR ( image encryption algorithm ))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 1

    A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes حسب Temadher Alassiry Al-Maadeed (14147847)

    منشور في 2022
    "…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …"
  2. 2

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer حسب M. Z. Yildiz (16855476)

    منشور في 2019
    "…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
  3. 3

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group حسب Iqtadar Hussain (14147850)

    منشور في 2023
    "…To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</p><h2>Other Information</h2><p dir="ltr">Published in: Computational and Applied Mathematics<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s40314-023-02208-x" target="_blank">https://dx.doi.org/10.1007/s40314-023-02208-x</a></p>…"
  4. 4
  5. 5

    Exploiting Sparsity in Amplify-and-Forward Broadband Multiple Relay Selection حسب Ala Gouissem (7006463)

    منشور في 2019
    "…In particular, by separating all the subcarriers or some subcarrier groups from each other and by optimizing the selection and beamforming vector(s) using OMP algorithm, a higher level of frequency diversity can be achieved. …"
  6. 6

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 7

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks حسب Umesh Kumar Lilhore (17727684)

    منشور في 2022
    "…In the proposed energy-efficient routing protocol, an enhanced cluster head node is used to select a strategy that can analyze the remaining energy and directions of each participating node. …"
  8. 8
  9. 9

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. Furthermore, encrypting the same amount of information in images of varying sizes resulted in approximately 6.77 percent improvements. …"
  10. 10

    Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System حسب Mohd Imran (12249782)

    منشور في 2025
    "…Our main contribution includes: (a) Secure template generation by Mobius transformation using user keyset (p, q), (b) Securing the user template using permutation and encryption operation. The analysis of security and matching performance of the proposed preservation scheme has been evaluated against publicly available fingerprint database FVC2000 DB1, FVC2000 DB2, FVC2002 DB1, FVC2002 DB3, FVC2004 DB1 and FVC2004 DB3 containing 800 images of 100 persons, 8 images per person in each database using FMR, FAR, GAR, ROC Curve, and EER parameters. …"
  11. 11

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks حسب Artail, Hassan

    منشور في 2009
    "…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 12

    A cluster-based model for QoS-OLSR protocol حسب Otrok, Hadi

    منشور في 2017
    "…Therefore, we propose a novel clustering algorithm and a relay node selection based on different combinations of metrics, such as connectivity, residual energy, and bandwidth. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 13

    The bus sightseeing problem حسب Qian Hu (205735)

    منشور في 2023
    "…Significant research focus has been directed toward profitable routing variants due to the practical importance of their applications and their interesting structure, which jointly optimizes node selection and routing decisions. Profitable routing applications arise in the tourism industry aiming to maximize the profit score of attractions visited within a limited time period. …"
  14. 14

    A degree-based heuristic for strongly connected dominating-absorbent sets in wireless ad-hoc networks حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…We introduce a hybrid heuristic for this problem, in which we combine low-degree vertex elimination and high-degree vertex selection. This simple and efficient method yields very promising experimental results, outperforming known heuristic algorithms.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  15. 15
  16. 16

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying حسب Tekli, Joe

    منشور في 2023
    "…We use a semantic-aware inverted index to allow semantic-aware search, result selection, and result ranking functionality. The semantically augmented XML data tree is processed for structural node clustering, based on semantic query concepts (i.e., key-concepts), in order to identify and rank candidate answer sub-trees containing related occurrences of query key-concepts. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 17

    DSDM: A Distributed Service Discovery Model for Manets حسب Artail, Hassan

    منشور في 2008
    "…This model is built on top of the network layer of the TCP/IP stack and benefits from the up-to-date routing information enabled by proactive routing protocols that attempt to keep the information in the routing tables of the mobile nodes current. The designed system is based on storing service descriptions in selected nodes that are searched in accordance to a proposed Minimum Distance Packet Forwarding (MDPF) algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 18

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…<p>The non-linear property of Chaos is a promising approach to information security, and many accomplishments have been made by combining Chaos with several sub-security domains, including chaos-based stream ciphers, block ciphers, image encryption, and hash functions. Most Chaos-based hash functions are insecure or inefficient due to their dependence on complex, attacked multi-dimensional maps or uncertain, weak one-dimensional maps like logistic and tent. …"
  19. 19

    A novel network-based SIS framework for improved GA performance حسب Tohme, Rawane

    منشور في 2025
    "…Genetic algorithms have long been used to solve complex optimization problems by mimicking natural selection processes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  20. 20