Search Results - (( intelligence _ closed algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- closed algorithm »
- rsa algorithm »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
5
A Comparison Between Levenberg-Marquardt (LM) Intelligent System And Bayesian Regularization (BR) Intelligent System For Flow Regime Classification
Published 2006“…These studies will help in choosing the right training algorithm for classification problem involved. These intelligent systems have to classify flow regimes in a closed line with the data are provided by Electrical Capacitance Tomography (ECT). …”
Get full text
Get full text
Monograph -
6
Multi-target tracking algorithm in intelligent transportation based on wireless sensor network
Published 2018“…A multi-target tracking algorithm using wireless sensors in an intelligent transportation system is proposed. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
8
Design of artificial intelligence based speed estimator for DC drives / Pauziah Saleh
Published 2006“…The data from the closed loop DC motor with PID controller is used. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Video surveillance: Item monitoring against theft
Published 2023“…Here, we have developed an intelligent video surveillance system that is capable of identifying the close loitering event and monitoring the select item in the scene by integrating these approaches, such as the You-Only-Look-Once (YOLO) version 5 object detection algorithm, close-contact detection, feature matching, significant movement and dissimilarity detections. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
An Algorithm for Vehicle Detection and Tracking
Published 2010Get full text
Get full text
Conference or Workshop Item -
13
-
14
-
15
A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali
Published 2015“…It has been found that by implementing the ACP algorithm, the solution predicted is approximately close or similar to the exact solution. …”
Get full text
Get full text
Thesis -
16
DESIGN AND IMPROVEMENT OF ALGORITHMS FOR AUTONOMOUS MOBILE ROBOT
Published 2013“…By applying PID algorithms, the robot’s speed and direction can be in closed-loop control. …”
Get full text
Get full text
Final Year Project -
17
Natural-based underwater image color enhancement through fusion of swarm-intelligence algorithm
Published 2019“…Through the fusion of swarm intelligence algorithm, the mean values of inferior color channels are adjusted to be closed to the mean value of superior color channel. …”
Get full text
Get full text
Get full text
Article -
18
Students’ perceptions towards the ethical considerations of using artificial intelligence algorithms in clinical decision-making
Published 2024“…Abstract Aim: The present study aimed to explore the perceptions of dental students regarding the ethical considerations associated with the use of artificial intelligence (AI) algorithms in clinical decision-making. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Intelligent control of grain drying process using fuzzy logic controller.
Published 2010“…This paper focused on the design and application of fuzzy logic controller in order to obtain the grain output moisture content close to the set-point in spite of disturbances. …”
Get full text
Get full text
Article -
20
