Search Results - (( intelligence a ((dea algorithm) OR (rsa algorithm)) ) OR ( intelligence based e algorithm ))
Search alternatives:
- intelligence based »
- intelligence a »
- dea algorithm »
- rsa algorithm »
- e algorithm »
- based e »
-
1
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Apart from that, sizing algorithm with DEA was also discovered to outperform sizing algorithms with selected computational intelligence, i.e. …”
Get full text
Get full text
Thesis -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
5
-
6
-
7
Solving university examination timetabling problem using intelligent water drops algorithm
Published 2024Conference Paper -
8
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000Get full text
Get full text
Thesis -
9
-
10
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…This work presents an enhanced intelligent intrusion detection model (E2IDS) to detect state of the art known cyberattacks. …”
Get full text
Get full text
Article -
11
-
12
-
13
Swarm intelligence algorithms’ solutions to the travelling salesman’s problem
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm
Published 2017“…These two algorithms are compared to their original artificial intelligence algorithms, i.e. particle swarm optimization algorithm and genetic algorithm. …”
Get full text
Get full text
Thesis -
15
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis -
16
-
17
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
