Search alternatives:
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search)
image encryption » image generation (Expand Search)
Showing 1 - 20 results of 47 for search '(( code ((generation algorithm) OR (selection algorithm)) ) OR ( image encryption algorithm ))', query time: 0.13s Refine Results
  1. 1

    A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes by Temadher Alassiry Al-Maadeed (14147847)

    Published 2022
    “…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …”
  2. 2

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
  3. 3

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</p><h2>Other Information</h2><p dir="ltr">Published in: Computational and Applied Mathematics<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s40314-023-02208-x" target="_blank">https://dx.doi.org/10.1007/s40314-023-02208-x</a></p>…”
  4. 4

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data by Behrouz Ahadzadeh (19757022)

    Published 2024
    “…To overcome these challenges, a new FS algorithm named Uniform-solution-driven Binary Feature Selection (UniBFS) has been developed in this study. …”
  5. 5

    Minimum traffic inter-BS SHO boundary selection algorithm for CDMA-based wireless networks by Abu-Amara, M.

    Published 2004
    “…An algorithm is presented to select an inter-base station soft handoff (inter-BS SHO) boundary for code division multiple access (CDMA)-based wireless networks. …”
    Get full text
    Get full text
    article
  6. 6
  7. 7

    LNCRI: Long Non-Coding RNA Identifier in Multiple Species by Saleh Musleh (15279190)

    Published 2021
    “…<p>The pervasive nature of long non-coding RNA (lncRNA) transcription in the mammalian genomes has changed our protein-centric view of genomes. …”
  8. 8

    CNN and HEVC Video Coding Features for Static Video Summarization by Issa, Obada

    Published 2022
    “…During coding, 64 proposed features were generated from the coder for each frame. …”
    Get full text
    article
  9. 9

    Generating haptic texture using solid noise by Osama Halabi (14158905)

    Published 2021
    “…In computer haptics, texture can render environments more realistic and provide useful information. In this paper, an algorithm is proposed for virtual texture simulation by using solid noise, where only a few parameters need to be altered to generate a range of realistic and diverse textures by reproducing different frequencies similar to that of real vibrational signals in a virtual environment. …”
  10. 10

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
  11. 11
  12. 12
  13. 13

    Practical single node failure recovery using fractional repetition codes in data centers by Itani, May

    Published 2016
    “…Node failures in distributed storage systems are becoming a critical issue, and many erasure codes are designed to handle such failures. The purpose of this paper is to evaluate fractional repetition (FR) codes, a class of regenerating codes for distributed storage systems, as a practical solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 14
  15. 15

    A new genetic algorithm approach for unit commitment by Mantawy, A.H.

    Published 1997
    “…In the proposed algorithm, coding the solution of the unit commitment problem is based on mixing binary and decimal representations. …”
    Get full text
    Get full text
    article
  16. 16

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…DNA microarray technology is the fabrication of a single chip to contain a thousand genetic codes. Each microarray experiment can analyze many thousands of genes in parallel. …”
    Get full text
  17. 17
  18. 18

    A genetic-based algorithm for fuzzy unit commitment model by Mantawy, A.H.

    Published 2000
    “…In the implementation for the GA, coding of the UCP solutions is based on mixing binary and decimal representations. …”
    Get full text
    Get full text
    article
  19. 19

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
    Get full text
    Get full text
    article
  20. 20

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. Furthermore, encrypting the same amount of information in images of varying sizes resulted in approximately 6.77 percent improvements. …”