Showing 141 - 160 results of 213 for search '(optical OR optimal) encryption algorithm', query time: 0.08s Refine Results
  1. 141

    Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs by N. Naveen, J. Nirmaladevi

    Published 2025-07-01
    “…The proposed methodology is built upon the conventional AODV protocol which uses bio-inspired Elephant Herding Optimization algorithm. Here, Trust Value (TV) which is the important security measure is considered as the fundamental parameter of route selection. …”
    Get full text
    Article
  2. 142

    High-Performance Number Theoretic Transform on GPU Through radix2-CT and 4-Step Algorithms by Alisah Ozcan, Arsalan Javeed, Erkay Savas

    Published 2025-01-01
    “…To this end, our algorithms leverage novel strategy to optimize memory access patterns adaptive to input size, which often is very large. …”
    Get full text
    Article
  3. 143

    Design Optimization of Parameters for Resolver Software Decoding Based on Surrogate Model Management by DENG Yu, LING Yuelun, WU Zuolai, PENG Zaiwu, WANG Jun

    Published 2025-06-01
    “…Next, a surrogate model was constructed for the software decoding system, using the Latin hypercube design (LHD) method and based on a radial basis function. Finally, a genetic algorithm (GA) was utilized to optimize parameters in the resolver software decoding system through a solving process, and a partial encryption method was introduced to iteratively update the surrogate model, yielding a partially optimal solution that meets the error requirements. …”
    Get full text
    Article
  4. 144
  5. 145

    Secure cloud computing: leveraging GNN and leader K-means for intrusion detection optimization by Raman Dugyala, Premkumar Chithaluru, M. Ramchander, Sunil Kumar, Arvind Yadav, N. Sudhakar Yadav, Diaa Salama Abd Elminaam, Deema Mohammed Alsekait

    Published 2024-12-01
    “…Additionally, the study introduces an optimized Grasshopper Optimization algorithm, which enhances the performance of the Optimal Neural Network, further refining detection accuracy. …”
    Get full text
    Article
  6. 146

    Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution by Don Roosan, Rubayat Khan, Saif Nirzhor, Fahmida Hai

    Published 2025-05-01
    “…Future studies should explore additional optimizations, homomorphic encryption, and larger-scale pilots under regulatory standards.…”
    Get full text
    Article
  7. 147

    Optimal path selection and secured data transmission in underwater acoustic sensor networks: LSTM-based energy prediction. by Sathish Kaveripakam, Ravikumar Chinthaginjala

    Published 2023-01-01
    “…Further, the data is transmitted via the optimal path securely by encrypting the data with the proposed improved blowfish algorithm (IBFA). …”
    Get full text
    Article
  8. 148

    Mitigating Transmission Errors: A Forward Error Correction-Based Framework for Enhancing Objective Video Quality by Muhammad Babar Imtiaz, Rabia Kamran

    Published 2025-06-01
    “…This is achieved by combining H.264/AVC syntax-based encryption and decryption algorithms with error correction during the video coding process to provide end-to-end confidentiality. …”
    Get full text
    Article
  9. 149

    A hybrid PKI and spiking neural network approach for enhancing security and energy efficiency in IoMT-based healthcare 5.0 by Dipalee D․Rane Chaudhari, Manisha S. Bhende, Aadam Quraishi, Azzah AlGhamdi, Ismail Keshta, Mukesh Soni, Brajesh Kumar Singh, Haewon Byeon, Mohammad Shabaz

    Published 2025-06-01
    “…Thus, a novel security framework is proposed in this work, in which a Public Key Infrastructure- Energy-Efficient Routing Protocol (PKI-EERP) with a Zebra Optimization Algorithm (ZOA) is incorporated in spiking neural networks. …”
    Get full text
    Article
  10. 150

    GuardianML: Anatomy of Privacy-Preserving Machine Learning Techniques and Frameworks by Nges Brian Njungle, Eric Jahns, Zhenqi Wu, Luigi Mastromauro, Milan Stojkov, Michel A. Kinsy

    Published 2025-01-01
    “…GuardianML filters potential frameworks based on user-defined criteria, such as the number of parties involved in multi-party computation or the need to minimize communication costs in homomorphic encryption scenarios. The system’s recommendations and optimizations are formulated as a maximization problem using linear integer programming to identify the most suitable solution for various use cases. …”
    Get full text
    Article
  11. 151

    A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms by Yangbo Chen, Wei Ou, Mengxue Pang, Jianqiang Ma, Qiuling Yue, Wenbao Han

    Published 2025-04-01
    “…To further enhance operational efficiency, the system incorporates performance optimization strategies such as batch processing and incremental synchronization. …”
    Get full text
    Article
  12. 152

    Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution by Nawal Shaltout, Ahmed A.Abd El-Latif, Waleed M. Al-Adrousy, Samir Elmougy

    Published 2023-01-01
    “…The proposed encryption method depends mainly on four steps: sequence generation, diffusion, confusion, and optimization. …”
    Get full text
    Article
  13. 153

    A Framework for Generating S-Box Circuits with Boyer–Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin by Yongjin Jeon, Seungjun Baek, Giyoon Kim, Jongsung Kim

    Published 2024-12-01
    “…The gate count in the cipher and the circuit depth must be low to minimize these two metrics. Many optimization strategies have been developed for the linear layer, led by the Boyer–Peralta (BP) algorithm. …”
    Get full text
    Article
  14. 154

    Optimizing Energy Efficiency in Vehicular Edge-Cloud Networks Through Deep Reinforcement Learning-Based Computation Offloading by Ibrahim A. Elgendy, Ammar Muthanna, Abdullah Alshahrani, Dina S. M. Hassan, Reem Alkanhel, Mohamed Elkawkagy

    Published 2024-01-01
    “…Given the complexity of this problem in large-scale vehicular networks, the study formulates an equivalent reinforcement learning model and employs a deep learning algorithm to derive optimal solutions. Simulation results conclusively demonstrate that the proposed model significantly outperforms existing benchmark techniques in terms of energy savings.…”
    Get full text
    Article
  15. 155

    DNS over HTTPS Tunneling Detection System Based on Selected Features via Ant Colony Optimization by Hardi Sabah Talabani, Zrar Khalid Abdul, Hardi Mohammed Mohammed Saleh

    Published 2025-05-01
    “…Ant Colony Optimization (ACO) is integrated with machine learning algorithms such as XGBoost, K-Nearest Neighbors (KNN), Random Forest (RF), and Convolutional Neural Networks (CNNs) using CIRA-CIC-DoHBrw-2020 as the benchmark dataset. …”
    Get full text
    Article
  16. 156
  17. 157

    A Novel QR Code–Based Solution for Secure Electronic Health Record Transfer in Venous Thromboembolism Home Rehabilitation Management: Algorithm Development and Validation by Changzhen Li, Zhigeng Jin, Fei Wang, Zheqi Zhang, Binbin Liu, Yutao Guo

    Published 2025-08-01
    “…It uses BPE, Avro, and Gzip for optimized data compression and uses ChaCha20 and BLAKE3 for encryption and authentication. …”
    Get full text
    Article
  18. 158

    Verifiable secure image retrieval for cloud-assisted IoT environments by GUO Jiaqi, MA Zhi, WANG Wensheng, TIAN Cong, DUAN Zhenhua

    Published 2025-03-01
    “…A matrix-based approach was employed for indexing and querying, and the feature matrix was encrypted using an enhanced secure k-nearest neighbor (kNN) algorithm based on the learning with errors (LWE), ensuring improved security in indexing and querying. …”
    Get full text
    Article
  19. 159

    Deep Reinforcement Learning-Enabled Computation Offloading: A Novel Framework to Energy Optimization and Security-Aware in Vehicular Edge-Cloud Computing Networks by Waleed Almuseelem

    Published 2025-03-01
    “…Then a deep learning-based algorithm is designed to learn close-optimal offloading solutions under dynamic conditions. …”
    Get full text
    Article
  20. 160

    Pilot-Based Codebook Non-Orthogonal Artificial Noise Schemes for Physical Layer Security: Secrecy Capacity Optimization Under Unknown Eavesdropper Channels by Yi Zhang, Yebo Gu, Tao Zhao, Bo Wang

    Published 2024-01-01
    “…It uses the successive convex approximation algorithm to analyze the optimal power allocation strategy and the maximum number of eavesdropper antennas that the system can tolerate under these conditions. …”
    Get full text
    Article