Search Results - (( intelligence _ graph algorithm ) OR ( intelligence a ((data algorithm) OR (rsa algorithm)) ))
Search alternatives:
- graph algorithm »
- intelligence a »
- data algorithm »
- rsa algorithm »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Optimization of Maximum Power Point Tracking (MPPT) of Photovoltaic System using Artificial Intelligence (AI) Algorithms
Published 2013“…Studies on the conventional and intelligent algorithms are conducted and a comparison between their efficiencies and drawbacks is presented. …”
Get full text
Get full text
Final Year Project -
3
The application of suitable sports games for junior high school students based on deep learning and artificial intelligence
Published 2025“…This study intends to develop a Spatial Temporal-Graph Convolutional Network (ST-GCN) action detection algorithm based on the MediaPipe framework. …”
Get full text
Get full text
Get full text
Article -
4
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…A tool termed as VIGA-20 (Visualization of Genetic Algorithm using 2-0 Graph) is implemented to accomplish this goal. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
-
8
-
9
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
10
-
11
Mining sequence of event from vector-based spatiotemporal database
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Modification of particle swarm optimization algorithm for optimization of discrete values
Published 2011“…It is inspired by the seemingly intelligent swarming behaviour of animals in nature [2). …”
Get full text
Get full text
Research Reports -
13
Energy management of battery to DC motor
Published 2008“…For charging profile, a data is produced by using a 12V 20A charger that is connected to a series of battery. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
15
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The aim of this thesis is to develop a fair and efficient packet scheduling and adaptive bandwidth allocation algorithms to support QoS for a diverse service class for A-MSDU aggregation in IEEE 802.1 In network. …”
Get full text
Get full text
Thesis -
17
Enhancement of network security by use machine learning
Published 2019“…The coding is designed in a way that there is an attack of malicious to destroy the data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Adaptive and optimized radio resource allocation algorithms for OFDMA based networks
Published 2015“…The higher the number of suitable subcarriers that can be judiciously assigned to a SS, the more the SS will gain by way of a higher performance contributing to total higher data rate efficiency. …”
Get full text
Get full text
Thesis -
19
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
20
Solving the minimum dominating set problem of partitioned graphs using a hybrid bat algorithm
Published 2020“…This paper investigates the swarm intelligence behaviour represented by a population-based approach called the bat algorithm (BA) to find the smallest set of nodes that dominate the graph. …”
Get full text
Get full text
Article
