Search Results - (( intelligence a bit algorithm ) OR ( intelligence based e algorithm ))
Search alternatives:
- intelligence based »
- intelligence a »
- bit algorithm »
- e algorithm »
- based e »
- a bit »
-
1
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
2
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The wireless system has been tested using different distances between SDR antennas. The received power, bit loss percentage and PSNR for the received image have been obtained, results shows a 35dB PSNR for normal distance between SDR antennas (20cm) and 7dB for 150cm, while bits are totally lost when reaching 200cm.…”
Get full text
Get full text
Thesis -
3
Routing based multi-agent system for network reliability in the smart microgrid
Published 2020“…In this paper, the focus is to enhance the intelligence of microgrid networks using a multi-agent system while validation is carried out using network performance metrics i.e., delay, throughput, jitter, and queuing. …”
Get full text
Get full text
Article -
4
Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes
Published 2018“…It connected the physical devices to the Internet and made them become more intelligent. In home automation system based on IoT, user-requested operations may have malfunction problems when bits error gets generated due to heavy noise in the fading channel. …”
Get full text
Get full text
Monograph -
5
-
6
A bit-serial sum of absolute difference accelerator for variable block size motion estimation of H.264
Published 2009Get full text
Get full text
Conference or Workshop Item -
7
-
8
Solving university examination timetabling problem using intelligent water drops algorithm
Published 2024Conference Paper -
9
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000Get full text
Get full text
Thesis -
10
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…This work presents an enhanced intelligent intrusion detection model (E2IDS) to detect state of the art known cyberattacks. …”
Get full text
Get full text
Article -
13
An artificial-intelligence-based approach for audio steganography
Published 2009Get full text
Get full text
Article -
14
-
15
An attack proof intelligent digital watermarking based on safe region of fast fourier transform
Published 2010“…The implementation results have shown that this watermarking algorithm has high level of imperceptibility and the watermark bit were all recovered correctly. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005Get full text
Conference or Workshop Item -
18
Swarm intelligence algorithms’ solutions to the travelling salesman’s problem
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm
Published 2017“…These two algorithms are compared to their original artificial intelligence algorithms, i.e. particle swarm optimization algorithm and genetic algorithm. …”
Get full text
Get full text
Thesis -
20
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis
