Search Results - (( intelligence _ rsa algorithm ) OR ( intelligence based window algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2
  3. 3

    Implementation of an intelligent SINS navigator based on ANFIS by Ahjebory, Karim M., Ismaeel, Salam A., Alqaissi, Ahmed M.

    Published 2009
    “…As in previous work, which is based on Artificial Neural Network, the window based weight updating strategy was used, and the intelligent navigator evaluated using several SINS hypothetical field tests data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Snake detection system using convolutional neural network / Muhammad Danial Ahmad Tarmizi by Ahmad Tarmizi, Muhammad Danial

    Published 2020
    “…The algorithm is built using Tensorflow software. The development of the project is based on Waterfall methodology. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Experiment and analysis of computer vision-based wrist radial and ulnar deviation exercises by M. Zabri, Abu Bakar, Rosdiyana, Samad, Pebrianti, Dwi, Mahfuzah, Mustafa, Nor Rul Hasma, Abdullah

    Published 2017
    “…The researchers have kept on improving the existing methods by creating novel method or developing new algorithms in image processing and artificial intelligence. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  13. 13

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The simulation results show the AMS algorithm significantly improves the performance over RSA-MSDU and the standard for real-time traffic in terms of reducing average delay and packet loss up to 56% and 24% respectively. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Adaptive multi-parent crossover GA for feature optimization in epileptic seizure identification by Al-Sharhan, Salah, Bimba, Andrew

    Published 2019
    “…The proposed approach in this work tends to tackle the multiple EEG channels problem by segmenting the EEG signals in the frequency domain based on changing spikes rather than the traditional time based windowing approach. …”
    Get full text
    Get full text
    Article
  17. 17

    Predictive Analytics Of Cigs Solar Cell Using A Combinational Gra-Mlr-Ga Model by Salehuddin, Fauziyah, Kaharudin, Khairil Ezwan, Mohd Zain, Anis Suhaila, Roslan, Ameer Farhan

    Published 2020
    “…Nevertheless, the impact of layer thickness and doping concentration of a window layer - Zinc oxide (ZnO), a buffer layer - Cadmium sulfide (Cds) and an absorber layer (CIGS) needs to be intelligently controlled for more balanced CIGS solar cell performances. …”
    Get full text
    Get full text
    Get full text
    Article