بدائل البحث:
element » elements (توسيع البحث)
update » updated (توسيع البحث)
colony » colon (توسيع البحث)
element » elements (توسيع البحث)
update » updated (توسيع البحث)
colony » colon (توسيع البحث)
-
1
Security testing and evaluation of cryptography algorithms. (c2003)
منشور في 2003احصل على النص الكامل
احصل على النص الكامل
masterThesis -
2
-
3
-
4
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …"
-
5
-
6
Axes-Based Encryption Key
منشور في 2018احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
7
Scrambled Prime Key Encryption
منشور في 2018"…To enhance data security different cryptographic algorithms are used. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
8
Arabic Text Classification Using Modified Artificial Bee Colony Algorithm for Sentiment Analysis: The Case of Jordanian Dialect
منشور في 2022"…The second phase, modified the Artificial Bee Colony (ABC) Algorithm, with Upper Confidence Bound (UCB) Algorithm, to promote the exploitation ability for the minimum dimension, to get the minimum number of the optimal feature, then using forward feature selection strategy by four classifiers of machine learning algorithms: (K-Nearest Neighbors (KNN), Support vector machines (SVM), Naïve-Bayes (NB), and Polynomial Neural Networks (PNN). …"
احصل على النص الكامل
-
9
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022الموضوعات: -
10
A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
11
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
-
12
Using artificial bee colony to optimize software quality estimation models. (c2015)
منشور في 2016"…In this thesis, we propose a novel heuristic based on Artificial Bee Colony (ABC) to optimize rule-based software quality prediction models. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
13
-
14
-
15
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
منشور في 2025"…Integrating cryptographic techniques with biometric modality has presented a dual-layered security mechanism, significantly mitigating the risk of biometric data breaches. In this paper, we propose a biometric template preservation scheme that employs minutiae transformation and encryption of biometric features for secure biometric template generation. …"
-
16
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …"
-
17
-
18
A Hardware Model of an Expandable RSA Cryptogrsphic System
منشور في 1998"…The larger the key size is the longer the encryption/decryption time will be. To cope with the continuous demand for larger key sizes, faster hardware implementations of the RSA algorithm has become an active area of research. …"
احصل على النص الكامل
masterThesis -
19
Hardware Model of an Expandable RSA Cryptographic System
منشور في 1998"…The larger the key size is the longer the encryption/decryption time will be. To cope with the continuous demand for larger key sizes, faster hardware implementations of the RSA algorithm has become an active area of research. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
20
Recent advances on artificial intelligence and learning techniques in cognitive radio networks
منشور في 2015"…The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article