Search alternatives:
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
-
1
Security testing and evaluation of cryptography algorithms. (c2003)
Published 2003Get full text
Get full text
masterThesis -
2
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019Subjects: Get full text
article -
3
-
4
-
5
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …”
-
6
Hardening the ElGamal cryptosystem in the setting of the second group of units. (c2011)
Published 2011Get full text
Get full text
masterThesis -
7
Axes-Based Encryption Key
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
8
Scrambled Prime Key Encryption
Published 2018“…To enhance data security different cryptographic algorithms are used. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
9
Development of an Optimization Algorithm for Internet Data Traffic
Published 2020“…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …”
Get full text
article -
10
-
11
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…FR codes consist of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
12
-
13
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022Subjects: -
14
-
15
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
-
16
A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)
Published 2006Get full text
Get full text
masterThesis -
17
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
Published 2024“…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …”
-
18
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
-
19
-
20
Predicting Patient ICU Readmission Using Recurrent Neural Networks With Long Short-Term Memory
Published 2025Subjects: