Search Results - (( intelligence _ closed algorithm ) OR ( intelligence based rsa algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Comparison Between Levenberg-Marquardt (LM) Intelligent System And Bayesian Regularization (BR) Intelligent System For Flow Regime Classification by Sa'ad, Mohamad Iqbal

    Published 2006
    “…These studies will help in choosing the right training algorithm for classification problem involved. These intelligent systems have to classify flow regimes in a closed line with the data are provided by Electrical Capacitance Tomography (ECT). …”
    Get full text
    Get full text
    Monograph
  6. 6

    Multi-target tracking algorithm in intelligent transportation based on wireless sensor network by Lei, Yang, Wu, Yuan, Khan Chowdhury, Ahmed Jalal

    Published 2018
    “…A multi-target tracking algorithm using wireless sensors in an intelligent transportation system is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  8. 8

    Design of artificial intelligence based speed estimator for DC drives / Pauziah Saleh by Saleh, Pauziah

    Published 2006
    “…The data from the closed loop DC motor with PID controller is used. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Video surveillance: Item monitoring against theft by Chong, Yiing Sheah

    Published 2023
    “…Here, we have developed an intelligent video surveillance system that is capable of identifying the close loitering event and monitoring the select item in the scene by integrating these approaches, such as the You-Only-Look-Once (YOLO) version 5 object detection algorithm, close-contact detection, feature matching, significant movement and dissimilarity detections. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali by Mohamed Kamali, Mohd Zahurin

    Published 2015
    “…It has been found that by implementing the ACP algorithm, the solution predicted is approximately close or similar to the exact solution. …”
    Get full text
    Get full text
    Thesis
  16. 16

    DESIGN AND IMPROVEMENT OF ALGORITHMS FOR AUTONOMOUS MOBILE ROBOT by CHIN, CHIN HAN SHEN

    Published 2013
    “…By applying PID algorithms, the robot’s speed and direction can be in closed-loop control. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Natural-based underwater image color enhancement through fusion of swarm-intelligence algorithm by Kamil Zakwan, Mohd Azmi, Ahmad Shahrizan, Abdul Ghani, Zulkifli, Md. Yusof, Zuwairie, Ibrahim

    Published 2019
    “…Through the fusion of swarm intelligence algorithm, the mean values of inferior color channels are adjusted to be closed to the mean value of superior color channel. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Students’ perceptions towards the ethical considerations of using artificial intelligence algorithms in clinical decision-making by Lin, Galvin Sim Siang, Tan, Wen Wu, Hashim, Hasnah

    Published 2024
    “…Abstract Aim: The present study aimed to explore the perceptions of dental students regarding the ethical considerations associated with the use of artificial intelligence (AI) algorithms in clinical decision-making. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Intelligent control of grain drying process using fuzzy logic controller. by Mansor, Halimathon, Mohd Noor, Samsul Bahari, Raja Ahmad, Raja Mohd Kamil, Taip, Farah Saleena, Lutfy, Omar F.

    Published 2010
    “…This paper focused on the design and application of fuzzy logic controller in order to obtain the grain output moisture content close to the set-point in spite of disturbances. …”
    Get full text
    Get full text
    Article
  20. 20