Search Results - (( intelligence ai mining algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- mining algorithm »
- intelligence ai »
- rsa algorithm »
- ai mining »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Application of artificial intelligence (AI) in islamic investments
Published 2020“…This study examines the application of Artificial Intelligence (AI) in Islamic Investments. AI technology is very popular in both the conventional and Islamic banking systems as reflected in the contributions of AI in Islamic investment. …”
Get full text
Get full text
Get full text
Article -
3
Evolution of AI enabled healthcare systems using textual data with a pretrained BERT deep learning model
Published 2025“…This study, using advanced text mining and multiple deep learning algorithms, utilized the Web of Science for scientific papers (1587) and the Derwent innovations index for patents (1314) from 2018 to 2022 to study future trends of emerging AI in healthcare. …”
Get full text
Get full text
Get full text
Article -
4
Smart agriculture economics and engineering: Unveiling the innovation behind ai-enhanced rice farming
Published 2025“…This article introduced innovative Artificial Intelligence-based (AI-based) predictive algorithms for short-term rice production, utilizing the Cross Industry Standard Process for Data Mining (CRISP-DM) data science framework. …”
Get full text
Get full text
Get full text
Article -
5
Enhanced Hopfield Neural Networks With Artificial Immune System Algorithm For Satisfiability Logic Programming
Published 2017“…A hybrid network called HNN-3SATAIS is proposed by assimilating the Hopfield neural network with the enhanced artificial immune system (AIS) algorithm as a training tool in doing 3-Satisfiability logic programming.…”
Get full text
Get full text
Thesis -
6
Sustainable energy management: Artificial intelligence-based electricity consumption prediction in limited dataset environment for industry applications
Published 2024“…This study aimed to develop a modified stacked ensemble multivariable Artificial Intelligence (AI)-based predictive algorithm, specifically Stacked Simple Linear Regression and Multiple Linear Regression (SLR-MLR), and Stacked Simple Linear Regression and Multiple Non-Linear Regression (SLR-MNLR) utilizing the Cross Industry Standard Process for Data Mining (CRISP-DM) data science methodology. …”
Get full text
Get full text
Get full text
Article -
7
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…AI algorithms rely on data or information to learn, analyze, and reach conclusions. …”
Get full text
Get full text
Get full text
Article -
8
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…AI algorithms rely on data or information to learn, analyze, and reach conclusions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…Then, in order to cope with the limitations of the existing artificial intelligence (AI) based methods, optimized gene expression programming (GEP) is applied to precisely formulate the relationships between historical data and EEC of ASEAN-5 countries. …”
Get full text
Get full text
Get full text
Thesis -
10
An efficient and effective case classification method based on slicing
Published 2006“…The paper also discusses two of common classification algorithms that are used either in data mining or in general AI. …”
Get full text
Get full text
Get full text
Article -
11
Artificial neural network approach for electric load forecasting in power distribution company / Hambali M. A ... [et al.]
Published 2017“…Researchers then performed data preprocessing on the data. Afterwards, data mining algorithms were applied in order to forecast electric load. …”
Get full text
Get full text
Get full text
Article -
12
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article -
13
-
14
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
15
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming
Published 2024“…To address these challenges, an innovative Artificial Intelligence-based (AI-based) predictive algorithm has been proposed, leveraging the Cross Industry Standard Process for Data Mining (CRISP-DM) data science framework. …”
Get full text
Get full text
Conference or Workshop Item -
17
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
18
Enhancing electricity consumption forecasting in limited dataset: A simple stacked ensemble approach incorporating simple linear and support vector regression for Malaysia
Published 2025“…This article introduces a novel artificial intelligence (AI) time-series algorithm, a simple stacked ensemble of simple linear regression (SLR) and Support Vector Regression (SVR), designed to forecast Malaysia’s annual electricity consumption, particularly in scenarios with limited datasets utilizing the Cross Industry Standard Process for Data Mining (CRISP-DM) data science methodology. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article
