Search Results - (( intelligence aid path algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- intelligence aid »
- path algorithm »
- rsa algorithm »
- based rsa »
- aid path »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots
Published 2022“…This evaluation focuses mostly on the accuracy of the different path-planning algorithms. Common collision-free path planning methodologies are examined in this paper, including classical or traditional and modern intelligence techniques, as well as both global and local approaches, in static and dynamic environments. …”
Get full text
Get full text
Get full text
Article -
3
Design of Modeling Elements of Luoshan Shadow Puppets Creative Goods Based on Deep Learning
Published 2023“…Based on the design of modeling elements of Luoshan shadow puppets, this paper analyzes the characteristics of visual elements of shadow puppet creative goods, puts forward an intelligent design algorithm of shadow puppet creative goods based on DL, and explores the computer-aided shadow puppets modeling design strategy driven by artificial intelligence. …”
Get full text
Get full text
Get full text
Proceeding -
4
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
5
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
7
-
8
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
9
Review on real-time control schemes for wheeled mobile robot
Published 2018“…The purpose of this paper is to review real-time control motion algorithms for wheeled mobile robot (WMR) when navigating in environment such as road. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Investigating the reliability of machine learning algorithms as an advanced tool for ozone concentration prediction
Published 2023“…Thus, it is highly required to examine the performance of various artificial intelligence techniques including standalone and hybrid algorithms for accurate ozone concentration prediction at the tropospheric layer. …”
text::Thesis
