Grasshopper optimization algorithm: theory, variants, and applications

Y Meraihi, AB Gabis, S Mirjalili… - Ieee …, 2021 - ieeexplore.ieee.org
Grasshopper Optimization Algorithm (GOA) is a recent swarm intelligence algorithm inspired
by the foraging and swarming behavior of grasshoppers in nature. The GOA algorithm has …

A new image encryption algorithm for grey and color medical images

ST Kamal, KM Hosny, TM Elgindy, MM Darwish… - Ieee …, 2021 - ieeexplore.ieee.org
Recently, diagnosing diseases using medical images became crucial. As these images are
transmitted through the network, they need a high level of protection. If the data in these …

Optimal bilateral filter and convolutional neural network based denoising method of medical image measurements

M Elhoseny, K Shankar - Measurement, 2019 - Elsevier
Image denoising has been foremost concern in the field of medical imaging (MI). For image
denoising, the most challenging is to protect the data bearing structures such as edges and …

Reliable data transmission model for mobile ad hoc network using signcryption technique

M Elhoseny, K Shankar - IEEE transactions on reliability, 2019 - ieeexplore.ieee.org
In recent years, the need for high security with reliability in the wireless network has
tremendously been increased. To provide high security in reliable networks, mobile ad hoc …

A survey on healthcare data: a security perspective

AK Singh, A Anand, Z Lv, H Ko, A Mohan - ACM Transactions on …, 2021 - dl.acm.org
With the remarkable development of internet technologies, the popularity of smart healthcare
has regularly come to the fore. Smart healthcare uses advanced technologies to transform …

Energy efficient optimal routing for communication in VANETs via clustering model

M Elhoseny, K Shankar - Emerging technologies for connected internet of …, 2020 - Springer
Abstract Vehicular Ad Hoc Network (VANET) is a kind of extraordinary remote ad hoc
network, which has high node portability and quick topology changes. Clustering is a system …

Chaos based Medical Image Encryption Techniques: A Comprehensive Review and Analysis

S Pankaj, M Dua - Information Security Journal: A Global …, 2024 - Taylor & Francis
In the past two decades, we have seen the proliferation of Internet and its applications. The
information exchange happens via images, videos, texts, audio clips, etc. Medical experts …

English teaching practice based on artificial intelligence technology

Y Bin, D Mandal - Journal of Intelligent & Fuzzy Systems, 2019 - content.iospress.com
The automatic scoring of English composition is an inevitable trend of the rapid development
of computer technology and artificial intelligence technology. This makes the research on …

Computer network security evaluation simulation model based on neural network

Y Tang, M Elhoseny - Journal of Intelligent & Fuzzy Systems, 2019 - content.iospress.com
The computer network security evaluation simulation model is analyzed based on neural
network. Firstly, based on the system security experimental platform, the system security …

[HTML][HTML] Review of bio-inspired optimization applications in renewable-powered smart grids: Emerging population-based metaheuristics

CB Pop, T Cioara, I Anghel, M Antal, VR Chifu, C Antal… - Energy Reports, 2022 - Elsevier
The management of renewable-powered smart grids deals with nonlinear optimization
problems featuring a variety of linear or nonlinear constraints, discrete or continuous …