Search Results - (( intelligence based ((acs algorithm) OR (rsa algorithm)) ) OR ( intelligence based _ algorithm ))
Search alternatives:
- intelligence based »
- acs algorithm »
- rsa algorithm »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Hybrid ant colony system algorithm for static and dynamic job scheduling in grid computing
Published 2015“…The algorithms are ACS(GA), ACS+GA, ACS(TS), and ACS+TS. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
-
5
-
6
Energy management strategies, control systems, and artificial intelligence-based algorithms development for hydrogen fuel cell-powered vehicles: A review
Published 2025“…EMS strategies; AI-based algorithms categories, functions and hybridization; the state-of-art and future direction of AI-based algorithms and HFCEVs? …”
Review -
7
Hybridization of enhanced ant colony system and Tabu search algorithm for packet routing in wireless sensor network
Published 2020“…A total of 6 datasets were deployed to evaluate the effectiveness of the proposed algorithm. Results showed that EACS(TS) outperformed in terms of success rate, packet loss, latency, and energy efficiency when compared with single swarm intelligence routing algorithms which are Energy-Efficient Ant-Based Routing (EEABR), BeeSensor and Termite-hill. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
Article -
9
Optimised intelligent tilt controller scheme using genetic algorithms
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
-
12
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
13
Development of hybrid artificial intelligent based handover decision algorithm
Published 2017“…Hence, in this paper, the development of novel hybrid artificial intelligent handover decision algorithm has been developed. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
-
15
Analysis of Delay Performance on the Intelligent Fuzzy Logic Dynamic Bandwidth Allocation Algorithm
Published 2023“…In this paper, we study the delay performance of an intelligent fuzzy logic based dynamic bandwidth allocation (IFLDBA) algorithm for EPON. …”
Article -
16
A speech recognition system based on structure equivalent fuzzy neural network trained by firefly algorithm
Published 2012Get full text
Working Paper -
17
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
18
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Optimal operation and control of hybrid power systems with stochastic renewables and FACTS devices: An intelligent multi-objective optimization approach
Published 2025“…The application of the recently developed flow direction algorithm, including its multi-objective variant with an �-based constraint-handling mechanism to OPF problem is the primary contributions of this work. …”
Article -
20
Advanced fault detection in DC microgrid system using reinforcement learning
Published 2021“…A fault detector based artificial intelligence should be implemented into the DC microgrid system to protect it. …”
Get full text
Get full text
Get full text
Get full text
Proceedings
