Search alternatives:
image encryption » image generation (Expand Search)
code » mode (Expand Search), core (Expand Search)
image encryption » image generation (Expand Search)
code » mode (Expand Search), core (Expand Search)
-
1
A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes
Published 2022“…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …”
-
2
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
-
3
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</p><h2>Other Information</h2><p dir="ltr">Published in: Computational and Applied Mathematics<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s40314-023-02208-x" target="_blank">https://dx.doi.org/10.1007/s40314-023-02208-x</a></p>…”
-
4
A new genetic algorithm approach for unit commitment
Published 1997“…This paper presents a new genetic algorithm approach to solve the unit commitment problem in electric power systems. …”
Get full text
Get full text
article -
5
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…The model takes the uncertainties in the forecasted load demand and the spinning reserve constraints in a fuzzy frame. The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …”
Get full text
Get full text
article -
6
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
Get full text
Get full text
article -
7
-
8
Design of PSS and STATCOM-based damping stabilizers using genetic algorithms
Published 2006“…The design problem of STATCOM-based stabilizers is formulated as an optimization problem. Then, a real-coded genetic algorithm (RCGA) is employed to search for optimal stabilizer parameters. …”
Get full text
Get full text
article -
9
Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem
Published 1999“…A new implementation of the genetic algorithm is introduced. The genetic algorithm solution is coded as a mix between binary and decimal representation. …”
Get full text
Get full text
article -
10
A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem
Published 2020“…In the proposed algorithm, genetic algorithm solution is coded as a mix between binary and decimal representation. …”
Get full text
article -
11
Robust Coordinated Design of Excitation and TCSC-Based Stabilizers Using genetic algorithms
Published 2004“…The coordinated design problem of robust excitation and TCSC-based controllers over a wide range of loading conditions and system configurations is formulated as an optimization problem with an eigenvalue-based objective function. The real-coded genetic algorithm (RCGA) is employed to search for optimal controller parameters. …”
Get full text
article -
12
Integrating Genetic Algorithms, Tabu Search, And Simulated Annealing For The Unit Commitment Problem
Published 2020“…A new implementation of the genetic algorithm is introduced. The genetic algorithm solution is coded as a mix between binary and decimal representation. …”
Get full text
article -
13
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
Published 2023“…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…”
-
14
Multi-Objective Task Allocation Via Multi-Agent Coalition Formation
Published 2012Get full text
doctoralThesis -
15
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
16
-
17
Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability
Published 2017“…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…”
-
18
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. Furthermore, encrypting the same amount of information in images of varying sizes resulted in approximately 6.77 percent improvements. …”
-
19
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
Published 2025“…Our main contribution includes: (a) Secure template generation by Mobius transformation using user keyset (p, q), (b) Securing the user template using permutation and encryption operation. The analysis of security and matching performance of the proposed preservation scheme has been evaluated against publicly available fingerprint database FVC2000 DB1, FVC2000 DB2, FVC2002 DB1, FVC2002 DB3, FVC2004 DB1 and FVC2004 DB3 containing 800 images of 100 persons, 8 images per person in each database using FMR, FAR, GAR, ROC Curve, and EER parameters. …”
-
20
Practical Multiple Node Failure Recovery in Distributed Storage Systems
Published 2016“…The problem is solved using genetic algorithms that search within the feasible solution space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject