Showing 161 - 180 results of 187 for search 'optimal encryption algorithm', query time: 0.09s Refine Results
  1. 161

    Huffman coding-based data reduction and quadristego logic for secure image steganography by Irsyad Fikriansyah Ramadhan, Ntivuguruzwa Jean De La Croix, Tohari Ahmad, Andre Uzamurengera

    Published 2025-05-01
    “…To address these challenges, this study proposes a novel steganographic algorithm integrating two key innovations: (1) Enhancement of stego image quality via stego image’s segmentation into four images, reducing concentration-induced distortions, and (2) optimization of data embedding through Huffman coding through a lossless compression minimizing the embedding-induced distortions while maximizing payload capacity. …”
    Get full text
    Article
  2. 162

    FEXGBIDS: Federated XGBoost-Based Intrusion Detection System for In-Vehicle Network by Jie Li, Yuanyuan Song, Ming-Gang Zheng, Shuo Zhang, Han Liang

    Published 2025-01-01
    “…We use the BatchCrypt algorithm to batch encrypt first- and second-order gradients to reduce the computational and communication overhead of Paillier homomorphic encryption. …”
    Get full text
    Article
  3. 163

    TCCM: Trajectory Converged Chaff-Based Mix-Zone Strategy for Enhancing Location Privacy in VANET by Yunheng Wu

    Published 2025-01-01
    “…Additionally, the TCCM strategy incorporates a genetic algorithm to optimize mix zone placement and ensure a balance between privacy protection and resource efficiency. …”
    Get full text
    Article
  4. 164

    CONSTRUCTION OF SUBSTITUTION BOX (S-BOX) BASED ON IRREDUCIBLE POLYNOMIALS ON GF(2^8) by Faldy Tita, Adi Setiawan, Bambang Susanto

    Published 2024-03-01
    “…In the field of modern encryption algorithms, the creation of S-Box is an essential element that plays an important role in maintaining data security in various industries. …”
    Get full text
    Article
  5. 165

    An online tool based on the Internet of Things and intelligent blockchain technology for data privacy and security in rural and agricultural development by Krishnaprasath Vellimalaipattinam Thiruvenkatasamy, Hayder M. A. Ghanimi, Sudhakar Sengan, Meshal Ghalib Alharbi

    Published 2025-07-01
    “…Central to this model is the proposed Quantum Neural Network + Bayesian Optimization (QNN + BO), a practiced algorithm that, when combined with methods like the Elliptic Curve Cryptography (ECC) and Coyote Optimization Algorithm (COA), guarantees secure data flow, processing, and storage. …”
    Get full text
    Article
  6. 166

    ApproximateSecret Sharing in Field of Real Numbers by Jiaqi Wan, Ziyue Wang, Yongqiang Yu, Xuehu Yan

    Published 2025-07-01
    “…To address these issues, this paper proposes an innovative algorithm to optimize SSS via type-specific coding for real numbers. …”
    Get full text
    Article
  7. 167

    Analysis and Research on Intelligent Logistics Data under Internet of Things and Blockchain by Yige Li

    Published 2024-12-01
    “…This stability is primarily attributed to the seamless integration of BC technology, which optimizes data packet transmission paths and mitigates waiting time. …”
    Get full text
    Article
  8. 168

    Noise Impact Analysis in Computer-Generated Holography Based on Dual Metrics Evaluation via Peak Signal-to-Noise Ratio and Structural Similarity Index Measure by Yucheng Li, Yang Zhang, Deyu Jia, Song Gao, Muqun Zhang

    Published 2025-05-01
    “…The findings provide theoretical guidance for noise suppression, parameter optimization, and algorithm selection in CGH systems, advancing its applications in optical encryption and high-precision imaging.…”
    Get full text
    Article
  9. 169

    A Novel Approach to Strengthening Cryptography Using RSA, Efficient Domination and Fuzzy Logic by Ghulam Muhiuddin, Annamalai Meenakshi, Janusz Kacprzyk, Ganesan Ambika, Hossein Rashmamlou

    Published 2025-05-01
    “…Although it has many applications in problems in computation, it is only for cryptography in contexts involving efficient algorithms, combinatorial structures, and optimization for security that it finds uses. …”
    Get full text
    Article
  10. 170

    ECC Based Load Information Protection Scheme for Electric Vehicle Users by Renwu YAN, Yang ZHENG, Zhixiong LIN, Yihan LIN, Zhipeng YU, Wenfeng ZHANG

    Published 2023-01-01
    “…On this basis, the load decomposition algorithm is designed as a test tool for the encryption scheme to decompose the encrypted power data. …”
    Get full text
    Article
  11. 171

    AgriChainSync: A Scalable and Secure Blockchain-Enabled Framework for IoT-Driven Precision Agriculture by Hassam Ahmed Tahir, Walaa Alayed, Waqar Ul Hassan, Fahad Nabi, Truong X. Tran

    Published 2024-01-01
    “…The proposed framework shows a dynamic data storage algorithm that optimizes storage decisions based on data characteristics and features. …”
    Get full text
    Article
  12. 172

    Enhancing Efficiency and Security in MTC Environments: A Novel Strategy for Dynamic Grouping and Streamlined Management by Maloth Bhavsingh, K Samunnisa, A Mallareddy

    Published 2024-04-01
    “…Our proposed solution integrates advanced cryptographic methods, including an optimized Authenticated Message Authentication Code (AMAC) and lightweight encryption, sophisticated optimization algorithms for dynamic grouping, and an efficient, lightweight group management protocol. …”
    Get full text
    Article
  13. 173

    Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks by Sharaf Aldeen Abdulkadhum Abbas, Abdullahi Abdu Ibrahim

    Published 2024-06-01
    “…This research aims to compare the key machine learning approaches, Namely Support Vector Machines (SVM), Random Forest (RF) and Decision Trees (DT), in their ability to classify Intrusion Detection Systems (IDS) via routing networks over distributed computing systems. In addition, Algorithms perform quality control to determine the optimal hyperplane for the given data, Find neighboring data points and preserve the structure of the tree. …”
    Get full text
    Article
  14. 174

    The Impact of AI Software on Financial Transactions by Li Boyang

    Published 2025-01-01
    “…To address these challenges, the paper proposes strengthening data protection through advanced encryption and access controls, improving algorithmic transparency with Explainable AI (XAI), and enhancing regulatory frameworks to monitor high-frequency trading. …”
    Get full text
    Article
  15. 175

    A deep learning-orchestrated garlic routing architecture for secure telesurgery operations in healthcare 4.0 by Kavit Shah, Nilesh Kumar Jadav, Rajesh Gupta, Sucheta Gupta, Sudeep Tanwar, Joel J.P.C. Rodrigues, Fayez Alqahtani, Amr Tolba

    Published 2025-06-01
    “…ElGamal encryption encrypts the session tags for each telesurgery data relayed between surgeons and the robotic arm. …”
    Get full text
    Article
  16. 176

    Research on Credit Risk Prevention in Supply Chain Finance Driven by Blockchain by Lin Kejing

    Published 2025-01-01
    “…It will also detail the principles and characteristics of blockchain technology, including its decentralized architecture, encryption algorithms, resistance to tampering, smart contract functionalities, and more. …”
    Get full text
    Article
  17. 177

    The Alliance of BIM and Artificial Intelligence: Challenges for a Reinvented Future – The State of the Art by Ellyssa Abdelmoula, Meriem Zammel, Najla Allani

    Published 2025-06-01
    “…It also highlights the importance of data encryption, AI skills development and a comprehensive training framework within organizations to ensure successful implementation of AI-integrated BIM. …”
    Get full text
    Article
  18. 178

    Microservices for information support of multi-agent systems: methods of collection, monitoring and decision-making by A. A. Bryzgalov

    Published 2025-01-01
    “…The research uses methods of building a microservice architecture to separate and autonomously perform functions such as data collection, monitoring and diagnostics in order to optimize SLA and increase system reliability. To increase the system's resilience to security threats, access control, data encryption, and anomaly analysis stages have been added to the algorithms. …”
    Get full text
    Article
  19. 179

    AHA: Design and Evaluation of Compute-Intensive Hardware Accelerators for AMD-Xilinx Zynq SoCs Using HLS IP Flow by David Berrazueta-Mena, Byron Navas

    Published 2025-05-01
    “…The increasing complexity of algorithms in embedded applications has amplified the demand for high-performance computing. …”
    Get full text
    Article
  20. 180

    CareNexus: Integrated solutions for Healthcare Communication by Alexandru Ioan BULZAN

    Published 2025-05-01
    “…A secure authentication based on multiple factors and the use of encryption algorithms, an interface based on different user roles and a prediction system based on model training had been implemented. …”
    Get full text
    Article