Search Results - (( intelligence ai acs algorithm ) OR ( intelligence based ((data algorithm) OR (rsa algorithm)) ))
Search alternatives:
- intelligence ai »
- data algorithm »
- acs algorithm »
- rsa algorithm »
-
1
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…Then, in order to cope with the limitations of the existing artificial intelligence (AI) based methods, optimized gene expression programming (GEP) is applied to precisely formulate the relationships between historical data and EEC of ASEAN-5 countries. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
-
4
Legal Innovation in Religious Courts: The Potential Utilization of Artificial Intelligence (AI) in Resolving Contemporary Cases.
Published 2024“…Religious courts face complex challenges in resolving contemporary cases, such as marital disputes, inheritance distribution, and conflicts in Sharia-based economic matters. In the digital era, Artificial Intelligence (AI) offers innovative solutions to enhance the efficiency and accuracy of legal processes. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Stress Classification using Deep Learning with 1D Convolutional Neural Networks
Published 2021“…Identifying whether someone is suffering from stress is crucial before it becomes a severe illness. Artificial Intelligence (AI) interprets external data, learns from such data, and uses the learning to achieve specific goals and tasks. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
7
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
8
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
10
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
Time series data intelligent clustering algorithm for landslide displacement prediction
Published 2018“…To address this problem, an intelligent clustering algorithm for time series data in landslide displacement prediction based on nonlinear dynamic time bending is proposed in this paper. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
