Search Results - (( intelligence based ((rsa algorithm) OR (_ algorithm)) ) OR ( intelligence based ems algorithm ))
Search alternatives:
- intelligence based »
- rsa algorithm »
- ems algorithm »
- based ems »
-
1
Energy management strategies, control systems, and artificial intelligence-based algorithms development for hydrogen fuel cell-powered vehicles: A review
Published 2025“…EMS strategies; AI-based algorithms categories, functions and hybridization; the state-of-art and future direction of AI-based algorithms and HFCEVs? …”
Review -
2
EM-Psychiatry: An Ambient Intelligent System for Psychiatric Emergency
Published 2016“…A modified Viterbi, a machine-learning algorithm, is used to generate the most probable psychiatric state sequence based on such observations; then, from the most likely psychiatric state sequence, the emergency psychiatric state is predicted through the proposed algorithm. …”
Get full text
Get full text
Article -
3
-
4
-
5
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…In this study we advance a model for mining of user’s navigation pattern. The model is based on expectation-maximization (EM) algorithm and it is used for finding maximum likelihood estimates of parameters in probabilistic models, where the model depends on unobserved latent variables. …”
Get full text
Get full text
Article -
6
-
7
New Energy Management System Based on Intelligent Digital Power Monitoring
Published 2009“…This paper introduces a new Energy Management System (EMS) based on intelligent digital power monitoring. …”
Get full text
Get full text
Conference or Workshop Item -
8
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
9
Energy Management Strategy (EMS) for Hybrid Electric Vehicles base on Safe Experimentation Dynamics (SED)
Published 2019Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Employing Artificial Intelligence to Minimize Internet Fraud
Published 2009“…Today, pre-empting or preventing fraud before it happens occurs in the manual, non-computer based business transactions because of the natural intelligence of both seller and buyer. …”
Get full text
Get full text
Article -
11
A Hybrid Soft Computing Framework for Electrical Energy Optimization
Published 2021“…In this paper, a hybrid soft-computing-based framework has been proposed for intelligent energy management and optimization. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Energy Management System For Three-Wheel Light Electric Vehicle Using Multi-Sources Energy Models
Published 2016“…A rule-based control algorithm which contains eight states in EMS is designed to control power switches and to ensure sufficient energy is delivered to the load. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Optimization of wind energy conversion systems � an artificial intelligent approach
Published 2023Article -
14
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
15
Farmland fertility optimization for designing of interconnected multi-machine power system stabilizer
Published 2020“…This study describes the process of interconnected multi-machine power system stabilizer (PSS) optimization using a new intelligent technique called farmland fertility algorithm (FFA) to increase the stability of IEEE three machine nine bus power system and offset the low-frequency oscillations (LFOs) during a symmetrical 100 ms three-phase fault at bus 9. …”
Get full text
Get full text
Get full text
Article -
16
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
17
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
19
Stereo matching algorithm based on deep learning: a survey
Published 2022“…Based on the early survey that had been conducted, two major frameworks available in current stereo matching algorithm development, they are traditional and artificial intelligence (AI) frameworks. …”
Get full text
Get full text
Get full text
Article -
20
Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis
Published 2025“…Complementary K-Means clustering grouped the data into two major clusters, indicating that a clear differentiation between economic-based and entrepreneurship-based courses in terms of student enrolment volume and approval distribution. …”
Get full text
Get full text
Get full text
Article
