بدائل البحث:
image encryption » image generation (توسيع البحث)
code » mode (توسيع البحث), core (توسيع البحث)
image encryption » image generation (توسيع البحث)
code » mode (توسيع البحث), core (توسيع البحث)
-
1
A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes
منشور في 2022"…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …"
-
2
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
-
3
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</p><h2>Other Information</h2><p dir="ltr">Published in: Computational and Applied Mathematics<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s40314-023-02208-x" target="_blank">https://dx.doi.org/10.1007/s40314-023-02208-x</a></p>…"
-
4
A new genetic algorithm approach for unit commitment
منشور في 1997"…This paper presents a new genetic algorithm approach to solve the unit commitment problem in electric power systems. …"
احصل على النص الكامل
احصل على النص الكامل
article -
5
A genetic-based algorithm for fuzzy unit commitment model
منشور في 2000"…The model takes the uncertainties in the forecasted load demand and the spinning reserve constraints in a fuzzy frame. The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …"
احصل على النص الكامل
احصل على النص الكامل
article -
6
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …"
احصل على النص الكامل
احصل على النص الكامل
article -
7
-
8
Design of PSS and STATCOM-based damping stabilizers using genetic algorithms
منشور في 2006"…The design problem of STATCOM-based stabilizers is formulated as an optimization problem. Then, a real-coded genetic algorithm (RCGA) is employed to search for optimal stabilizer parameters. …"
احصل على النص الكامل
احصل على النص الكامل
article -
9
Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem
منشور في 1999"…A new implementation of the genetic algorithm is introduced. The genetic algorithm solution is coded as a mix between binary and decimal representation. …"
احصل على النص الكامل
احصل على النص الكامل
article -
10
A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem
منشور في 2020"…In the proposed algorithm, genetic algorithm solution is coded as a mix between binary and decimal representation. …"
احصل على النص الكامل
article -
11
Robust Coordinated Design of Excitation and TCSC-Based Stabilizers Using genetic algorithms
منشور في 2004"…The coordinated design problem of robust excitation and TCSC-based controllers over a wide range of loading conditions and system configurations is formulated as an optimization problem with an eigenvalue-based objective function. The real-coded genetic algorithm (RCGA) is employed to search for optimal controller parameters. …"
احصل على النص الكامل
article -
12
Integrating Genetic Algorithms, Tabu Search, And Simulated Annealing For The Unit Commitment Problem
منشور في 2020"…A new implementation of the genetic algorithm is introduced. The genetic algorithm solution is coded as a mix between binary and decimal representation. …"
احصل على النص الكامل
article -
13
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
منشور في 2023"…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…"
-
14
Multi-Objective Task Allocation Via Multi-Agent Coalition Formation
منشور في 2012احصل على النص الكامل
doctoralThesis -
15
Practical single node failure recovery using fractional repetition codes in data centers
منشور في 2016"…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
16
-
17
Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability
منشور في 2017"…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…"
-
18
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. Furthermore, encrypting the same amount of information in images of varying sizes resulted in approximately 6.77 percent improvements. …"
-
19
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
منشور في 2025"…Our main contribution includes: (a) Secure template generation by Mobius transformation using user keyset (p, q), (b) Securing the user template using permutation and encryption operation. The analysis of security and matching performance of the proposed preservation scheme has been evaluated against publicly available fingerprint database FVC2000 DB1, FVC2000 DB2, FVC2002 DB1, FVC2002 DB3, FVC2004 DB1 and FVC2004 DB3 containing 800 images of 100 persons, 8 images per person in each database using FMR, FAR, GAR, ROC Curve, and EER parameters. …"
-
20
Practical Multiple Node Failure Recovery in Distributed Storage Systems
منشور في 2016"…The problem is solved using genetic algorithms that search within the feasible solution space. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject