[HTML][HTML] Elephant herding optimization: variants, hybrids, and applications

J Li, H Lei, AH Alavi, GG Wang - Mathematics, 2020 - mdpi.com
Elephant herding optimization (EHO) is a nature-inspired metaheuristic optimization
algorithm based on the herding behavior of elephants. EHO uses a clan operator to update …

Lightweight encryption technique to enhance medical image security on internet of medical things applications

MK Hasan, S Islam, R Sulaiman, S Khan… - IEEE …, 2021 - ieeexplore.ieee.org
The importance of image security in the field of medical imaging is challenging. Several
research works have been conducted to secure medical healthcare images. Encryption, not …

A systematic review of metaheuristic-based image encryption techniques

M Kaur, S Singh, M Kaur, A Singh, D Singh - Archives of computational …, 2021 - Springer
Image encryption protects the sensitive and confidential information of images. This
protection comes from the combination of secret keys, encryption, and decryption algorithms …

Secured Cyber Security Algorithm for Healthcare System Using Blockchain Technology.

H Miriam, D Doreen, D Dahiya… - … Automation & Soft …, 2023 - search.ebscohost.com
Blockchain technology is critical in cyber security. The most recent cryptographic strategies
may be hacked as efforts are made to build massive electronic circuits. Because of the …

Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation system

SK Mousavi, A Ghaffari - Journal of Information Security and Applications, 2021 - Elsevier
Abstract The Internet of Things (IoT) includes various technologies, including sensing
devices, Radio-Frequency Identification (RFID), and Microelectromechanical Systems …

Efficiently encrypting color images with few details based on RC6 and different operation modes for cybersecurity applications

OS Faragallah, A Afifi, W El-Shafai, HS El-Sayed… - IEEE …, 2020 - ieeexplore.ieee.org
Recently, massive research works have been accomplished for augmenting privacy and
security requirements for cybersecurity applications in wireless communication networks …

Improved elephant herding optimization using opposition-based learning and K-means clustering to solve numerical optimization problems

W Li, GG Wang - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Elephant herding optimization (EHO) algorithm which is a new swarm intelligence
optimization algorithm was proposed in 2015. Its cores are clan updating operator and …

Integration of spatial and frequency domain encryption for digital images

A Shafique, MM Hazzazi, AR Alharbi, I Hussain - IEEE Access, 2021 - ieeexplore.ieee.org
Transmission of multimedia data such as images, videos, and audio over the Internet is risky
due to cyberattacks. To overcome the security issues, several encryption schemes are …

[HTML][HTML] Blockchain-driven image encryption process with arithmetic optimization algorithm for security in emerging virtual environments

MA Alohali, M Aljebreen, F Al-Mutiri, M Othman… - Sustainability, 2023 - mdpi.com
The real world is bounded by people, hospitals, industries, buildings, businesses, vehicles,
cognitive cities, and billions of devices that offer various services and interact with the world …

Nature-Inspired metaheuristic algorithms for constraint handling: challenges, issues, and research perspective

S Kaul, Y Kumar - Constraint handling in metaheuristics and applications, 2021 - Springer
Because of getting the efficient and accurate results in the field of optimization problem
solving, researchers are taking much attentiveness in heuristic and metaheuristic …