Search Results - (( intelligence _ rsa algorithm ) OR ( intelligence based acs algorithm ))
Search alternatives:
- intelligence based »
- rsa algorithm »
- acs algorithm »
- based acs »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
Hybrid ant colony system algorithm for static and dynamic job scheduling in grid computing
Published 2015“…The algorithms are ACS(GA), ACS+GA, ACS(TS), and ACS+TS. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
-
6
Hybridization of enhanced ant colony system and Tabu search algorithm for packet routing in wireless sensor network
Published 2020“…This research proposes a hybridization of Enhanced ACS and Tabu Search (EACS(TS)) algorithm for packet routing in WSN. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A speech recognition system based on structure equivalent fuzzy neural network trained by firefly algorithm
Published 2012Get full text
Working Paper -
8
-
9
Optimised intelligent tilt controller scheme using genetic algorithms
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
-
12
-
13
-
14
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
15
Advanced fault detection in DC microgrid system using reinforcement learning
Published 2021“…A fault detector based artificial intelligence should be implemented into the DC microgrid system to protect it. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
16
-
17
Optimal operation and control of hybrid power systems with stochastic renewables and FACTS devices: An intelligent multi-objective optimization approach
Published 2025“…The application of the recently developed flow direction algorithm, including its multi-objective variant with an �-based constraint-handling mechanism to OPF problem is the primary contributions of this work. …”
Article -
18
-
19
-
20
