Search Results - (( intelligence based ((rsa algorithm) OR (acs algorithm)) ) OR ( intelligence based a algorithm ))
Search alternatives:
- intelligence based »
- rsa algorithm »
- acs algorithm »
- a algorithm »
- based a »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Hybrid ant colony system algorithm for static and dynamic job scheduling in grid computing
Published 2015“…The exploration in ACS is based on a random approach without any strategy. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
-
5
-
6
Hybridization of enhanced ant colony system and Tabu search algorithm for packet routing in wireless sensor network
Published 2020“…This research proposes a hybridization of Enhanced ACS and Tabu Search (EACS(TS)) algorithm for packet routing in WSN. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…As the network is getting complex and congested, it will become challenging to satisfy the QoS requirements in the MPLS network. This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
Article -
8
-
9
-
10
-
11
Optimised intelligent tilt controller scheme using genetic algorithms
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Development of hybrid artificial intelligent based handover decision algorithm
Published 2017“…The possibility of seamless handover remains a mirage despite the plethora of existing handover algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
A speech recognition system based on structure equivalent fuzzy neural network trained by firefly algorithm
Published 2012Get full text
Working Paper -
17
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
19
Optimal operation and control of hybrid power systems with stochastic renewables and FACTS devices: An intelligent multi-objective optimization approach
Published 2025“…The application of the recently developed flow direction algorithm, including its multi-objective variant with an �-based constraint-handling mechanism to OPF problem is the primary contributions of this work. …”
Article -
20
Evaluating the Efficacy of Intelligent Methods for Maximum Power Point Tracking in Wind Energy Harvesting Systems
Published 2024“…Furtherly, Artificial Intelligence (AI)-based MPPT algorithms were proposed for the WEHS as either standalone or integrated with the traditional MPPT methods. …”
Review
