Search Results - (( intelligence ((based path) OR (based data)) algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- rsa algorithm »
- based path »
- based rsa »
-
1
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
2
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
4
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
5
Time series data intelligent clustering algorithm for landslide displacement prediction
Published 2018“…To address this problem, an intelligent clustering algorithm for time series data in landslide displacement prediction based on nonlinear dynamic time bending is proposed in this paper. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…It is proposed and shown that route-like intelligent motion is based on a combination of decisional and kinematical factors. …”
Get full text
Get full text
Thesis -
7
Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks
Published 2009“…Also the main aim of this research is to solve the freezing problem during optimum as well as sub-optimum path discovery process. In this research, Intelligent AntNet based Routing Algorithm (IANRA) is presented for routing in WMNs and MANET to find optimum and near-optimum paths for data packet routing. …”
Get full text
Get full text
Thesis -
8
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016Get full text
Get full text
Conference or Workshop Item -
9
-
10
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
11
Multi agent quality of service routing based on scheme ant colony optimization algorithm
Published 2014“…The important new aspect of ACR-QoS is the combination of constraint-based routing and DiffServ architecture, in Swarm Intelligence (SI) structure where a set of artificial ants is used to determine the optimal path for each class to construct class-based routing tables. …”
Get full text
Get full text
Thesis -
12
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…Recent advances in robotics and machine intelligence have led to the application of modern optimization method such as the genetic algorithm (GA), to solve the path-planning problem. …”
Get full text
Get full text
Get full text
Article -
13
Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques
Published 2024“…By contrast, the results of the safe path selection model were compared with the results obtained using Dijkstra's algorithm and the Floyd-Warshall algorithm. …”
thesis::doctoral thesis -
14
A Novel Map-matching Algorithm to Improve Vehicle Tracking System Accuracy
Published 2008“…Satellite-based Vehicle Tracking System accuracy can be improved by augmenting the positional information using road network data, in a process known as map-matching. …”
Get full text
Get full text
Article -
15
Adaptive route optimization for mobile robot navigation using evolutionary algorithm
Published 2021“…For example, Ant Colony Optimization (ACO) is an optimization algorithm based on swarm intelligence which is widely used to solve path planning problem. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
16
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…In this paper, an ant colony optimization (ACO) based WSN routing algorithm for IoT has been proposed and analyzed to enhance scalability, to accommodate node mobility and to minimize initialization delay for time critical applications in the context of IoT to find the optimal path of data transmission, improvising efficient IoT communications. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Development and Integration of Metocean Data Interoperability for Intelligent Operations and Automation Using Machine Learning: A Review
Published 2022“…This slows down provisioning, while the monitoring element of the Metocean data path is partial. In this paper, we demonstrate the capabilities of ML for the development of Metocean data integration interoperability based on intelligent operations and automation. …”
Get full text
Get full text
Article -
18
African Buffalo Optimization (ABO): A New Metaheuristic Algorithm
Published 2015“…This paper proposes a new meta-heuristic approach to solving numerical and graph-based problems. The African buffalo algorithm evolved from an understanding of the animal's survival instincts and the search techniques they utilize in the African forests and savannahs; the search for the optimal path to pasture is aligned to their cooperative, intelligent, and social nature. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Efficient flow-based channel assignment schemes for congestion avoidance in wireless mesh networks
Published 2016“…However, as a result of contention-based nature of IEEE 802.11-based wireless mesh network, the node capacity is limited by the contention, interference caused by hidden nodes, data transmission over low rate links, and frequent interface switching. …”
Get full text
Get full text
Thesis
