High-performance hardware architecture of a robust block-cipher algorithm based on different chaotic maps and DNA sequence encoding

R Amdouni, M Gafsi, R Guesmi, MA Hajjaji, A Mtibaa… - Integration, 2022‏ - Elsevier
Nowadays, secure digital data in store and transmission is an important issue.
Cryptographic methods are widely used to provide optimal security for multimedia data. In …

Comparative analysis of new meta-heuristic-variants for privacy preservation in wireless mobile adhoc networks for IoT applications

P Satyanarayana, G Diwakar, BV Subbayamma… - Computer …, 2023‏ - Elsevier
Abstract “Mobile Ad Hoc Network (MANET)” is a self-configurable, self-repairing, self-
maintaining, highly mobile, decentralized, and independent wireless network, which has the …

Multi‐objective‐derived energy efficient routing in wireless sensor networks using hybrid African vultures‐cuckoo search optimization

A Asha, N Verma, I Poonguzhali - International Journal of …, 2023‏ - Wiley Online Library
Summary Wireless Sensor Network (WSN) plays an essential role in consumer electronics,
remote monitoring, an electromagnetic signal, and so forth. The functional capacity of WSN …

Color image encryption using LFSR, DNA, and 3D chaotic maps

ST Allawi, DR Alshibani - International journal of electrical and …, 2022‏ - hrcak.srce.hr
Sažetak One of the most important challenges facing researchers is to find new methods to
protect data sent over the Internet and prevent unauthorized access to it. In this paper, we …

Development of optimal placement and sizing of FACTS devices in power system integrated with wind power using modified krill herd algorithm

S Neelamkavil Pappachan - COMPEL-The international journal for …, 2023‏ - emerald.com
Purpose This study aims to intend and implement the optimal power flow, where tuning the
production cost is done with the inclusion of stochastic wind power and different kinds of …

DNA computing in cryptography

J Gao, T **e - Advances in Computers, 2023‏ - Elsevier
Cryptography is used to prevent any unintentional party from reading or manipulating any
confidential information by converting it from the sender to the receiver and vice versa. It …

Adaptive squirrel coyote optimization-based secured energy efficient routing technique for large scale WSN with multiple sink nodes

CS Reddy, G Narsimha - Intelligent Decision Technologies, 2023‏ - journals.sagepub.com
In general, Wireless Sensor Networks (WSNs) require secure routing approaches for
delivering the data packets to their sinks or destinations. Most of the WSNs identify particular …

OHRDBN: An optimized hybrid model of RBF and DBN for obstacle‐aware routing with optimal path selection in VANET sector

SK Dhanapal, R Thenmozhi - International Journal of …, 2024‏ - Wiley Online Library
Vehicular ad hoc networks (VANETs) are increasingly essential for communication
architecture utilized in daily human life. The presence of obstacles in the terrain area, as well …

Biosensors for biomolecular computing: a review and future perspectives

S Aiassa, R Terracciano, S Carrara, D Demarchi - BioNanoScience, 2020‏ - Springer
Biomolecular computing is the field of engineering where computation, storage,
communication, and coding are obtained by exploiting interactions between biomolecules …

Efficient Channel Estimation in Multiple Input Multiple Output Communication Systems using Hybrid Intelligence‐based Deep Learning Model using Horse Dingo …

BMR Manasa, VP - Transactions on Emerging …, 2023‏ - Wiley Online Library
The estimation of the channel in multiple input multiple output (MIMO) systems over wireless
communication has faced many challenges, such as high bit rate transmission with less time …