بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
te algorithm » rd algorithm (توسيع البحث), deer algorithm (توسيع البحث), _ algorithms (توسيع البحث)
element te » elementi per (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
te algorithm » rd algorithm (توسيع البحث), deer algorithm (توسيع البحث), _ algorithms (توسيع البحث)
element te » elementi per (توسيع البحث)
-
1
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…In addition, the proposed encryption algorithm utilizes two different chaotic maps. …"
-
2
A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes
منشور في 2022"…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …"
-
3
-
4
Scrambled Prime Key Encryption
منشور في 2018"…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
5
CNN and HEVC Video Coding Features for Static Video Summarization
منشور في 2022احصل على النص الكامل
article -
6
-
7
-
8
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
-
9
-
10
-
11
Automatic Video Summarization Using HEVC and CNN Features
منشور في 2022احصل على النص الكامل
doctoralThesis -
12
-
13
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
14
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
منشور في 2024"…This study also focuses on the use of wireless sensor networks in different fields. Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …"
-
15
Isolating Physical Replacement of Identical IoT Devices Using Machine and Deep Learning Approaches
منشور في 2021احصل على النص الكامل
doctoralThesis -
16
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
17
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …"
-
18
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …"
-
19
Secure and Anonymous Communications Over Delay Tolerant Networks
منشور في 2020"…As such, our protocol does not list the intermediate nodes along the route's path and, therefore, enhances significantly the anonymity of the underlying communications. We propose two different approaches for encrypting the exchanged messages. …"
-
20
New Dimensions for Physical Layer Secret Key Generation: Excursion Lengths-Based Key Generation
منشور في 2024"…The practical PLSKG algorithms (level-crossing algorithms) extract a secret key by analyzing the channel samples and assigning bit sequences to the channel samples lying in different quantization regions. …"