Search Results - (( intelligence ai cell algorithm ) OR ( intelligence based rsa algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1
  2. 2

    Energy management strategies, control systems, and artificial intelligence-based algorithms development for hydrogen fuel cell-powered vehicles: A review by Oladosu T.L., Pasupuleti J., Kiong T.S., Koh S.P.J., Yusaf T.

    Published 2025
    “…EMS strategies; AI-based algorithms categories, functions and hybridization; the state-of-art and future direction of AI-based algorithms and HFCEVs? …”
    Review
  3. 3

    A Modular Intelligent Control Framework for Scalable Biohydrogen Production in Microbial Electrolysis Cells by Mohd Farid, Atan, Mohamad Afiq, Mohd Asrul, Andrica Claudia, Henry, Hafizah, Abdul Halim Yun, Ivy Tan, Ai Wei, Josephine Lai, Chang Hui

    Published 2025
    “…This review traces the evolution of five control paradigms, including voltage/proportional-integral-derivative (PID), model-based, adaptive, fuzzy logic, and artificial-intelligence (AI) systems, as well as hybrid intelligent controllers, and benchmarks each against scalability, dynamic responsiveness, and energy-recovery performance. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…It also has the ability to learn, recognize, and remember, thus providing the solid foundation for the development of Artificial Immune System (AIS). Since the emergence of AIS, it has proved itself as an area of computational intelligence. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Geospatial AI-based approach to assess the spatiotemporal suitability of onshore wind-solar farms in Iraq by Sachit, Mourtadha Sarhan Almushattat

    Published 2023
    “…To overcome these challenges, the current research aims to develop a SpatioTemporal Decision-Making (STDM) model based on Geospatial Artificial Intelligence (GeoAI) to locate onshore wind-solar hybrid plants. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An Intelligent Hybrid Model Using CNN and RNN for Crop Yield Prediction by JUNE, KHOO YAN

    Published 2023
    “…In this study, an intelligent hybrid model using CNN and RNN for crop yield prediction is proposed. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15

    Blood cell classification using deep learning by Liaw, Mun Kin

    Published 2022
    “…The advancement of Artificial Intelligence (AI) has introduced complex methods such as deep learning that would automate the classification of blood cells in a fast and accurate manner Thus, the study of White Blood Cells (WBCs) classification using deep learning techniques is proposed in this research. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article