Showing 181 - 200 results of 213 for search '(optical OR optimal) encryption algorithm', query time: 0.11s Refine Results
  1. 181

    Implementation of Personal Health Device Communication Protocol Applying ISO/IEEE 11073-20601 by Deok Seok Seo, Soon Seok Kim, Yong Hee Lee, Jong Mo Kim

    Published 2014-05-01
    “…Moreover, security is enhanced by applying the international symmetric key encryption standard, advanced encryption standard (AES), for secure data transmission from the weight sensor to gateway. …”
    Get full text
    Article
  2. 182

    Federated learning for digital twin applications: a privacy-preserving and low-latency approach by Jie Li, Dong Wang

    Published 2025-08-01
    “…To address these security and privacy threats, this paper proposes the FL-FedDT scheme—a privacy-preserving and low-latency FL method that employs an enhanced Paillier homomorphic encryption algorithm to safeguard the privacy of local device parameters without transmitting data to the server. …”
    Get full text
    Article
  3. 183

    Research on Modeling and Dynamic Characteristics of Complex Biological Neural Network Model considering BP Neural Network Method by Hongyan Chen

    Published 2021-01-01
    “…The BP neural network algorithm can be used to solve more complex dynamic behaviors and can optimize the global search. …”
    Get full text
    Article
  4. 184

    Integrated Protocols to Ensure Security Services in Wireless Sensor Networks by Mohammed Faisal, Jalal Al-Muhtadi, Abdullah Al-Dhelaan

    Published 2013-07-01
    “…The proposed protocols integrate public key and symmetric key algorithms to ensure optimal usage of sensors' energy and processing power to provide adequate security in next generation WSN. …”
    Get full text
    Article
  5. 185

    Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0 by Mohammed El-Hajj, Teklit Haftu Gebremariam

    Published 2024-07-01
    “…Addressing this, this study introduces the ASCON algorithm for lightweight authenticated encryption with associated data, enhancing confidentiality, integrity, and authenticity within IoT limitations. …”
    Get full text
    Article
  6. 186

    Adaptive Dynamic Programming-Based Intelligent Finite-Time Flexible SMC for Stabilizing Fractional-Order Four-Wing Chaotic Systems by Mai The Vu, Seong Han Kim, Duc Hung Pham, Ha Le Nhu Ngoc Thanh, Van Huy Pham, Majid Roohi

    Published 2025-06-01
    “…The control strategy eliminates the need for explicit system models by exploiting the norm-bounded characteristics of chaotic system states. To optimize the parameters of the model-free FTF-SMC, a deep reinforcement learning framework based on the adaptive dynamic programming (ADP) algorithm is employed. …”
    Get full text
    Article
  7. 187

    Secure healthcare data sharing and attack detection framework using radial basis neural network by Abhishek Kumar, Priya Batta, Pramod Singh Rathore, Sachin Ahuja

    Published 2025-05-01
    “…The proposed authenticate access control mechanism (PA2C) safeguards data integrity as well as the security and dependability of EHR data sharing are improved by the use of smart contracts, encryption, and secure key management. On the other hand, the proposed intelligent voyage optimization algorithm-based Radial basis neural network (IntVO-RBNN) effectively detects the attacks in the network. …”
    Get full text
    Article
  8. 188

    Huffman coding-based data reduction and quadristego logic for secure image steganography by Irsyad Fikriansyah Ramadhan, Ntivuguruzwa Jean De La Croix, Tohari Ahmad, Andre Uzamurengera

    Published 2025-05-01
    “…To address these challenges, this study proposes a novel steganographic algorithm integrating two key innovations: (1) Enhancement of stego image quality via stego image’s segmentation into four images, reducing concentration-induced distortions, and (2) optimization of data embedding through Huffman coding through a lossless compression minimizing the embedding-induced distortions while maximizing payload capacity. …”
    Get full text
    Article
  9. 189

    FEXGBIDS: Federated XGBoost-Based Intrusion Detection System for In-Vehicle Network by Jie Li, Yuanyuan Song, Ming-Gang Zheng, Shuo Zhang, Han Liang

    Published 2025-01-01
    “…We use the BatchCrypt algorithm to batch encrypt first- and second-order gradients to reduce the computational and communication overhead of Paillier homomorphic encryption. …”
    Get full text
    Article
  10. 190

    TCCM: Trajectory Converged Chaff-Based Mix-Zone Strategy for Enhancing Location Privacy in VANET by Yunheng Wu

    Published 2025-01-01
    “…Additionally, the TCCM strategy incorporates a genetic algorithm to optimize mix zone placement and ensure a balance between privacy protection and resource efficiency. …”
    Get full text
    Article
  11. 191

    CONSTRUCTION OF SUBSTITUTION BOX (S-BOX) BASED ON IRREDUCIBLE POLYNOMIALS ON GF(2^8) by Faldy Tita, Adi Setiawan, Bambang Susanto

    Published 2024-03-01
    “…In the field of modern encryption algorithms, the creation of S-Box is an essential element that plays an important role in maintaining data security in various industries. …”
    Get full text
    Article
  12. 192

    An online tool based on the Internet of Things and intelligent blockchain technology for data privacy and security in rural and agricultural development by Krishnaprasath Vellimalaipattinam Thiruvenkatasamy, Hayder M. A. Ghanimi, Sudhakar Sengan, Meshal Ghalib Alharbi

    Published 2025-07-01
    “…Central to this model is the proposed Quantum Neural Network + Bayesian Optimization (QNN + BO), a practiced algorithm that, when combined with methods like the Elliptic Curve Cryptography (ECC) and Coyote Optimization Algorithm (COA), guarantees secure data flow, processing, and storage. …”
    Get full text
    Article
  13. 193

    ApproximateSecret Sharing in Field of Real Numbers by Jiaqi Wan, Ziyue Wang, Yongqiang Yu, Xuehu Yan

    Published 2025-07-01
    “…To address these issues, this paper proposes an innovative algorithm to optimize SSS via type-specific coding for real numbers. …”
    Get full text
    Article
  14. 194

    Analysis and Research on Intelligent Logistics Data under Internet of Things and Blockchain by Yige Li

    Published 2024-12-01
    “…This stability is primarily attributed to the seamless integration of BC technology, which optimizes data packet transmission paths and mitigates waiting time. …”
    Get full text
    Article
  15. 195

    A Novel Approach to Strengthening Cryptography Using RSA, Efficient Domination and Fuzzy Logic by Ghulam Muhiuddin, Annamalai Meenakshi, Janusz Kacprzyk, Ganesan Ambika, Hossein Rashmamlou

    Published 2025-05-01
    “…Although it has many applications in problems in computation, it is only for cryptography in contexts involving efficient algorithms, combinatorial structures, and optimization for security that it finds uses. …”
    Get full text
    Article
  16. 196

    ECC Based Load Information Protection Scheme for Electric Vehicle Users by Renwu YAN, Yang ZHENG, Zhixiong LIN, Yihan LIN, Zhipeng YU, Wenfeng ZHANG

    Published 2023-01-01
    “…On this basis, the load decomposition algorithm is designed as a test tool for the encryption scheme to decompose the encrypted power data. …”
    Get full text
    Article
  17. 197

    AgriChainSync: A Scalable and Secure Blockchain-Enabled Framework for IoT-Driven Precision Agriculture by Hassam Ahmed Tahir, Walaa Alayed, Waqar Ul Hassan, Fahad Nabi, Truong X. Tran

    Published 2024-01-01
    “…The proposed framework shows a dynamic data storage algorithm that optimizes storage decisions based on data characteristics and features. …”
    Get full text
    Article
  18. 198

    Enhancing Efficiency and Security in MTC Environments: A Novel Strategy for Dynamic Grouping and Streamlined Management by Maloth Bhavsingh, K Samunnisa, A Mallareddy

    Published 2024-04-01
    “…Our proposed solution integrates advanced cryptographic methods, including an optimized Authenticated Message Authentication Code (AMAC) and lightweight encryption, sophisticated optimization algorithms for dynamic grouping, and an efficient, lightweight group management protocol. …”
    Get full text
    Article
  19. 199

    Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks by Sharaf Aldeen Abdulkadhum Abbas, Abdullahi Abdu Ibrahim

    Published 2024-06-01
    “…This research aims to compare the key machine learning approaches, Namely Support Vector Machines (SVM), Random Forest (RF) and Decision Trees (DT), in their ability to classify Intrusion Detection Systems (IDS) via routing networks over distributed computing systems. In addition, Algorithms perform quality control to determine the optimal hyperplane for the given data, Find neighboring data points and preserve the structure of the tree. …”
    Get full text
    Article
  20. 200

    The Impact of AI Software on Financial Transactions by Li Boyang

    Published 2025-01-01
    “…To address these challenges, the paper proposes strengthening data protection through advanced encryption and access controls, improving algorithmic transparency with Explainable AI (XAI), and enhancing regulatory frameworks to monitor high-frequency trading. …”
    Get full text
    Article