Search Results - (( intelligence based _ms algorithm ) OR ( intelligence based rsa algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    The application of suitable sports games for junior high school students based on deep learning and artificial intelligence by Ji, Xueyan, Samsudin, Shamsulariffin, Hassan, Muhammad Zarif, Farizan, Noor Hamzani, Yuan, Yubin, Chen, Wang

    Published 2025
    “…This study intends to develop a Spatial Temporal-Graph Convolutional Network (ST-GCN) action detection algorithm based on the MediaPipe framework. This is achieved by integrating deep learning and artificial intelligence technologies. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A coevolutionary multiobjective evolutionary algorithm for game artificial intelligence by Tse, Guan Tan, Teo, Jason Tze Wi, Rayner Alfred, Kim, On Chin

    Published 2013
    “…Recently, the growth of Artificial Intelligence (AI) has provided a set of effective techniques for designing computer-based controllers to perform various tasks autonomously in game area, specifically to produce intelligent optimal game controllers for playing video and computer games. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    A coevolutionary multiobjective evolutionary algorithm for game artificial intelligence by Tse, Guan Tan, Jason, Teo, Kim, On Chin, Alfred, Rayner

    Published 2013
    “…Recently, the growth of Artificial Intelligence (AI) has provided a set of effective techniques for designing computer-based controllers to perform various tasks autonomously in game area, specifically to produce intelligent optimal game controllers for playing video and computer games. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Nature-Inspired cognitive evolution to play Ms. Pac-Man by Tse, Guan Tan, Jason Teo, Patricia Anthony

    Published 2011
    “…The experimental results show that an ES-based system can be successfully applied to automatically generate artificial intelligence for a complex, dynamic and highly stochastic video game environment.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks by Mubarak, Mohammed Awadh Ahmed Ben

    Published 2013
    “…The third scheme is a fuzzy logic-based self-adaptive handover (called FuzSAHO) for handover decision to provide an intelligent self-adaptive handover parameters technique based on received signal strength indicator (RSSI) and MS velocity. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  20. 20