Search alternatives:
image encryption » image generation (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
image encryption » image generation (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
-
1
A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes
Published 2022“…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …”
-
2
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019Subjects: Get full text
article -
3
-
4
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
-
5
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</p><h2>Other Information</h2><p dir="ltr">Published in: Computational and Applied Mathematics<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s40314-023-02208-x" target="_blank">https://dx.doi.org/10.1007/s40314-023-02208-x</a></p>…”
-
6
Development of an Optimization Algorithm for Internet Data Traffic
Published 2020“…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …”
Get full text
article -
7
-
8
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…FR codes consist of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
9
-
10
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
Published 2024“…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …”
-
11
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…Furthermore, encrypting the same amount of information in images of varying sizes resulted in approximately 6.77 percent improvements. …”
-
12
-
13
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
Published 2023“…A 3D finite element model was first developed and validated against available experimental results. …”
-
14
Predicting Patient ICU Readmission Using Recurrent Neural Networks With Long Short-Term Memory
Published 2025Subjects: -
15
A decentralized load balancing strategy for parallel search-three optimization. (c2010)
Published 2010Get full text
Get full text
masterThesis -
16
On the Optimization of Band Gaps in Periodic Waveguides
Published 2025“…<h3 dir="ltr">Purpose</h3><p dir="ltr">This work applies a computational framework for vibration attenuation in periodic structures by combining the established wave and finite element (WFE) method with nature-inspired optimization algorithms. …”
-
17
-
18
Oversampling techniques for imbalanced data in regression
Published 2024“…For such high-dimension data our approach outperforms the Synthetic Minority Oversampling Technique for Regression (SMOTER) algorithm for the IMDB-WIKI and AgeDB image datasets. …”
-
19
Dynamic adaptation for video streaming over mobile devices. (c2013)
Published 2013Get full text
Get full text
masterThesis -
20