Search Results - (( intelligence _ rsa algorithm ) OR ( intelligence system window algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Implementation of an intelligent SINS navigator based on ANFIS by Ahjebory, Karim M., Ismaeel, Salam A., Alqaissi, Ahmed M.

    Published 2009
    “…In this work an intelligent navigator developed to overcome the limitations of existing Strapdown Inertial Navigation Systems (SINS) algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Enhancement on the modified artificial bee colony algorithm to optimize the vehicle routing problem with time windows by Sankor, Salah Mortada Shahen

    Published 2022
    “…The Artificial Bee Colony (ABC) is a popular swarm intelligence algorithm for COP. In this study, existing Modified ABC (MABC) algorithm is revised to solve the VRPTW. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Snake detection system using convolutional neural network / Muhammad Danial Ahmad Tarmizi by Ahmad Tarmizi, Muhammad Danial

    Published 2020
    “…Objectives of this project is to design the flow of the system, developed in Window application and test the functionality of the system and reliability for the predictive model. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Genetic algorithm for event scheduling system by Hasan Basari, Abd Samad, Hussin, Burairah, Jalal, Siti Musliza, Mohd Isa, Nabihah

    Published 2010
    “…UTeM’s Event Alert System (UTeM-EAS) is an improved version of previous Event Alert System in Universiti Teknikal Malaysia Melaka (UTeM) official site that aims to apply Artificial Intelligence (AI) in order to provide its users with events priority. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Simulation and Visualization of TSP Using Ant Colony Optimization by Tri Basuki, Kurniawan, Misinem, ., Astried, ., Joan Angelina, Widians

    Published 2023
    “…The Travelling Salesman Problem (TSP) is a well-known algorithmic problem its main objective is optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Experiment and analysis of computer vision-based wrist radial and ulnar deviation exercises by M. Zabri, Abu Bakar, Rosdiyana, Samad, Pebrianti, Dwi, Mahfuzah, Mustafa, Nor Rul Hasma, Abdullah

    Published 2017
    “…The hand tracking, center of palm detection and fingertips detection and Kinect sensor are used in this exercise system. This system guides the user to perform the radial and ulnar deviation movements through the user's display window. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  16. 16

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The simulation results show the AMS algorithm significantly improves the performance over RSA-MSDU and the standard for real-time traffic in terms of reducing average delay and packet loss up to 56% and 24% respectively. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Exploration of educational building with cultural elements using shape grammar by Sebastian, Heng Junjie

    Published 2013
    “…Shape grammars are used for developing computational algorithms in production systems that generate geometric shapes. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Adaptive multi-parent crossover GA for feature optimization in epileptic seizure identification by Al-Sharhan, Salah, Bimba, Andrew

    Published 2019
    “…The proposed technique was evaluated using the publicly available epileptic seizure data from the machine learning repository of the UCI center for machine learning and intelligent systems. The proposed approach outperforms other ones and achieved a high level of accuracy. …”
    Get full text
    Get full text
    Article
  20. 20