بدائل البحث:
based encryption » image encryption (توسيع البحث), data encryption (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), novel algorithm (توسيع البحث), modbo algorithm (توسيع البحث)
data code » data model (توسيع البحث), data came (توسيع البحث)
based encryption » image encryption (توسيع البحث), data encryption (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), novel algorithm (توسيع البحث), modbo algorithm (توسيع البحث)
data code » data model (توسيع البحث), data came (توسيع البحث)
-
1
Optimization-Driven Steganographic System Based on Fused Maps and Blowfish Encryption
منشور في 2025الموضوعات: -
2
-
3
Access control pseudo-code.
منشور في 2025"…Consequently, a high-dimensional medical data attribute encryption access control method based on fuzzy algorithm is proposed. …"
-
4
-
5
Reported MATLAB data code.
منشور في 2025"…Validation with standard rheometer data showed reasonable agreement in elasticity, with percent differences of 2.1% for the hard and 13.3% for the soft phantoms. …"
-
6
-
7
Comparison of homomorphic encryption algorithms.
منشور في 2024"…To address these challenges, this paper proposes a federated learning-based intrusion detection algorithm (NIDS-FGPA) that utilizes gradient similarity model aggregation. …"
-
8
-
9
-
10
Encryption performance.
منشور في 2024"…We proposed a blockchain-based method for secure EHR management and integrated Ciphertext-Policy Attribute-Based Encryption (CP-ABE) for fine-grained access control. …"
-
11
-
12
-
13
G R code algorithm.
منشور في 2024"…The algorithm was developed and coded in Verilog and simulated using Modelsim. …"
-
14
-
15
-
16
-
17
-
18
-
19
-
20