Search Results - (( intelligence 2 bit algorithm ) OR ( intelligence based rsa algorithm ))

Refine Results
  1. 1

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    MOBILE ROBOT by ABU KASSIM, ABU MASNUR

    Published 2004
    “…An H-bridge circuit is used to control the motors' forward/reverse motion via its 2 bit binary inputs at its strobes. The H-bridge circuit utilizes Darlington-Pair transistors and diodes to control the forward/reverse current flow to the motor. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14

    Routing based multi-agent system for network reliability in the smart microgrid by Singh, N., Elamvazuthi, I., Nallagownden, P., Ramasamy, G., Jangra, A.

    Published 2020
    “…The proposed agent-based routing focuses on calculating the shortest path to a given destination to improve network quality and communication reliability. The algorithm is defined for the distributed nature of the microgrid for an ideal communication network and for two cases of fault injected to the network. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Real-Time Implementation Of LPC-10 Codec On TMS320C6713 DSP by Talib Alshammari, Wissam

    Published 2012
    “…During last two decades various speech coding algorithms have been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Traffic Control in a Synchronous Transfer Mode Networks by Khalil, Ibrahim

    Published 1995
    “…At the same time, transmission systems at bit rates of 2.5 Gb/s are now being installed, and the expected next generation of 10 Gb/s systems is emerging from the research laboratories. …”
    Get full text
    Get full text
    Thesis