Search Results - (( intelligence a ((data algorithm) OR (rsa algorithm)) ) OR ( intelligence system bas algorithm ))
Search alternatives:
- intelligence system »
- intelligence a »
- data algorithm »
- rsa algorithm »
- bas algorithm »
- system bas »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Review of data fusion methods for real-time and multi-sensor traffic flow analysis
Published 2023Review -
3
Tag cloud algorithm with the inclusion of personality traits
Published 2014“…Therefore, the main objective of this study is to make tag cloud algorithm with the inclusion of personality traits by adjusting two prominent visual features (color and shape) as an integration of layout.In addition, the utilization of RBS (rule bas e system) approach as artificial intelligent method is also taken into account to make knowledge base that stores the relationship between the proper personality elements and particular layout.This paper also discusses findings from satisfaction evaluation of prototyping, which comprises three dimensions facet: overall layout, color, and shape .The findings showed that the majority mean value for each dimension is categorized in agree scale (6-point), which indicates that respondents are satisfied with the tag cloud layout display generated by proposed algorithm.The findings suggest interface designers to be careful in selecting the appropriate tag clouds layout to be displayed for users with varying personality differences.…”
Get full text
Get full text
Get full text
Article -
4
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
6
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The aim of this thesis is to develop a fair and efficient packet scheduling and adaptive bandwidth allocation algorithms to support QoS for a diverse service class for A-MSDU aggregation in IEEE 802.1 In network. …”
Get full text
Get full text
Thesis -
8
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
9
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
Published 2019“…In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. …”
Get full text
Get full text
Article -
10
A theoretical framework for big data analytics based on computational intelligent algorithms with the potential to reduce energy consumption
Published 2019“…In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
11
Investigating the Application of Artificial Intelligence for Earthquake Prediction in Terengganu
Published 2023text::Thesis -
12
A Comparison Between Levenberg-Marquardt (LM) Intelligent System And Bayesian Regularization (BR) Intelligent System For Flow Regime Classification
Published 2006“…The comparison made showed that LM learning algortihm is a faster training algorithm compared to BR training algorithm meanwhile BR learning algorithm capable of building a superior intelligent system in term of the overall system performance.…”
Get full text
Get full text
Monograph -
13
Improvement on agglomerative hierarchical clustering algorithm based on tree data structure with bidirectional approach
Published 2024Conference Paper -
14
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Whereas the process of examining through the web pages, retrieving and searching the relevant data in a liTML page, and selecting the best satisfying data are based on the features and operations of the Genetic Algorithms.…”
Get full text
Get full text
Thesis -
15
-
16
An Intelligent Data-Driven Approach for Electrical Energy Load Management Using Machine Learning Algorithms
Published 2022“…This fusion of data science, artificial intelligence, and electrical energy management has turned out to be the most precise and robust energy management solution. …”
Get full text
Get full text
Get full text
Article -
17
A Novel Hybrid Evolutionary Data-Intelligence Algorithm for Irrigation and Power Production Management: Application to Multi-Purpose Reservoir Systems
Published 2019“…Multi-purpose advanced systems are considered a complex problem in water resource management, and the use of data-intelligence methodologies in operating such systems provides major advantages for decision-makers. …”
Get full text
Get full text
Article -
18
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
Published 2021“…Data collected from various sources underwent preprocessing state to prepare a required data format for data analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…A Comparison between the learned target machining data and data from MDH shows a low percentage of error. …”
Get full text
Get full text
Thesis -
20
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…It is significant to process and analyse electric power production data to diagnose a fault. High levels of informa-tionalisation and intellectualization can be achieved in the actual details of developing a Power Plant Fault Diagnosis Management System. …”
Article
