Search Results - (( intelligence based _ algorithm ) OR ( intelligence a bit algorithm ))
Search alternatives:
- intelligence based »
- intelligence a »
- bit algorithm »
- a bit »
-
1
An attack proof intelligent digital watermarking based on safe region of fast fourier transform
Published 2010“…The implementation results have shown that this watermarking algorithm has high level of imperceptibility and the watermark bit were all recovered correctly. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
An artificial-intelligence-based approach for audio steganography
Published 2009Get full text
Get full text
Article -
3
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The wireless system has been tested using different distances between SDR antennas. The received power, bit loss percentage and PSNR for the received image have been obtained, results shows a 35dB PSNR for normal distance between SDR antennas (20cm) and 7dB for 150cm, while bits are totally lost when reaching 200cm.…”
Get full text
Get full text
Thesis -
5
Robust multi-user detection based on hybrid grey wolf optimization
Published 2020Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
6
Encryption function on artificial neural network
Published 2016“…The images generated by applying each algorithm were tested for their regularity and residual intelligibility. …”
Get full text
Get full text
Article -
7
A bit-serial sum of absolute difference accelerator for variable block size motion estimation of H.264
Published 2009Get full text
Get full text
Conference or Workshop Item -
8
Routing based multi-agent system for network reliability in the smart microgrid
Published 2020“…From this model, up to 35â��43.3 improvement was achieved in the network delay performance based on the Constant Bit Rate (CBR) traffic model for microgrids. …”
Get full text
Get full text
Article -
9
Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes
Published 2018“…It connected the physical devices to the Internet and made them become more intelligent. In home automation system based on IoT, user-requested operations may have malfunction problems when bits error gets generated due to heavy noise in the fading channel. …”
Get full text
Get full text
Monograph -
10
Electrocardiogram based heart disease diagnosis using artificial intelligence
Published 2015“…After noise removal, the data from the ECG is to be acquired; for this purpose a method is devised based on DWT. Third stage is the features extraction; proposed a special domain based on DWT to extract diagnostic information from the ECG signal. …”
Get full text
Get full text
Thesis -
11
A proposed model for text and image encryption using different techniques
Published 2023“…In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. …”
Article -
12
Prototype development for embedding large amount of information using secure LSB and neural based steganography
Published 2009“…To achieve these goals, the embedding must be in suitable locations in the multimedia file, choosing the proper. A recent approach is using artificial intelligence that teaches the machine to give the best candidate bits to hide the information in. …”
Get full text
Get full text
Thesis -
13
Modeling and forecasting of injected fuel flow using neural network
Published 2011Get full text
Working Paper -
14
-
15
Traffic Control in a Synchronous Transfer Mode Networks
Published 1995“…Similarly, charges may differ for customers wanting to book capacity for a specified tie interval. Based on this scenario, various charge classes and booking policies are introduced. …”
Get full text
Get full text
Thesis -
16
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
17
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005Get full text
Conference or Workshop Item -
18
Application of intelligence based genetic algorithm for job sequencing problem on parallel mixed-model assembly line
Published 2010“…A heuristic algorithm was introduced to generate the initial population for intelligence based genetic algorithm. …”
Get full text
Get full text
Get full text
Article -
19
A novel algorithm to detect a QPSK signal with the minimum number of samples
Published 2015Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Fragile Image Watermarking For Medical Images
Published 2006Get full text
Get full text
Conference or Workshop Item
