The importance of encryption in most organizations, therefore, it became necessary to encrypt data because data security is an essential component in order to maintain the security of data and information in various institutions. Encryption also helps to ensure the confidentiality and integrity of data during transmission through communication channels. Given the importance of the keys used in encryption as a key part in the strength of the algorithm and increase its security in most encryption algorithms, thus generating the key in many research the most important part in data encryption and its importance lies in the non-duplication of keys to ensure better results and theoretically impossible to break. In this paper, we try to describe and review many of the papers that were used to create the keys and compare them with each other.
In the last two decades, soft computing modeling such as Artificial Intelligence (AI) approaches have gained a massive attention by the information technology researchers. Nowadays, AI models are improving human abilities in several areas of engineering and science problems. In this paper, we investigate the proficiency of modern heuristic approach called Multivariate adaptive regression splines (MARS) in prediction regression problem. The experimental data set of heavy metal is selected as a case study. The predictive model is conducted based on several physiochemical inputs variables. In order to inspect the MARS model accuracy, Multiple Linear Regression (MLR) model is chosen to compare the results. Here, the root mean square error (RMSE), mean absolute percentage error, and coefficient of determination are examined the accuracy of the models. The finding of the investigated model (i.e., MARS) exhibited a noticeable improving in the prediction accuracy in comparison with MLR.
The basic goal of this research study is to show a critical review of existing paper on human brain tumor classification systems above the last 10 years. Attention and study accomplishments in brain tumor classification have arisen essentially above the previous few years, particularly with the need for an assistant to the doctor to diagnose such critical non-faulty diseases has led to the building of this type of system, for instance neural networks is important compounds. Survey and evaluation become necessary, as the number of suggested techniques increases. This study present the survey focus on various researchers applied their systems using neural network, and moreover a contrast between these systems is discussed.
Encryption is the most secure way to save data, whether text, images, video, or any other type of multimedia, as in recent years, a lot of encryption algorithms have been suggested to protect this digital data from all kinds of attacks, and the protection process was carried out through encryption and the use of many algorithms. Through the proposed method, this research was focused on an important aspect, which is protecting the key by creating a new method for the algorithm key, as the more difficult it is to know the key, the more difficult it is to break the algorithm, as Rubik's Cube method was used to create the key of the AES algorithm, where it performs just throw the cube to generate the key, then the improved algorithm was used to encrypt the images and then restore the original image without problems and the process was of a high quality as the key configuration time was reduced and a good level of security was provided. The proposed method has been programmed in Visual Basic.Net 2015 language.
In the vast and still evolving the world of digital transfer, data/image security is one of the most important considerations. One method is to encrypt files. One of the well-known mechanisms for maintaining privacy of pictures to a trustworthy, unrestricted public, the media as a result, this medium is vulnerable to attacks, Encryption algorithms that are effective are a must for data transfer that is stable a variety of techniques. This paper is a study of research authors in the field of image encryption for the Android Environment for different algorithms, with a research review for the period (2010)(2011)(2012)(2013)(2014)(2015)(2016)(2017)(2018)(2019)(2020)(2021) to see how the field of image encryption has progressed and the best algorithms in their performance.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.