Search Results - (( intelligence based _ms algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- _ms algorithm »
- rsa algorithm »
- based _ms »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
-
3
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
The application of suitable sports games for junior high school students based on deep learning and artificial intelligence
Published 2025“…This study intends to develop a Spatial Temporal-Graph Convolutional Network (ST-GCN) action detection algorithm based on the MediaPipe framework. This is achieved by integrating deep learning and artificial intelligence technologies. …”
Get full text
Get full text
Get full text
Article -
6
A coevolutionary multiobjective evolutionary algorithm for game artificial intelligence
Published 2013“…Recently, the growth of Artificial Intelligence (AI) has provided a set of effective techniques for designing computer-based controllers to perform various tasks autonomously in game area, specifically to produce intelligent optimal game controllers for playing video and computer games. …”
Get full text
Get full text
Get full text
Article -
7
-
8
A coevolutionary multiobjective evolutionary algorithm for game artificial intelligence
Published 2013“…Recently, the growth of Artificial Intelligence (AI) has provided a set of effective techniques for designing computer-based controllers to perform various tasks autonomously in game area, specifically to produce intelligent optimal game controllers for playing video and computer games. …”
Get full text
Get full text
Get full text
Article -
9
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
10
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
11
-
12
Nature-Inspired cognitive evolution to play Ms. Pac-Man
Published 2011“…The experimental results show that an ES-based system can be successfully applied to automatically generate artificial intelligence for a complex, dynamic and highly stochastic video game environment.…”
Get full text
Get full text
Get full text
Article -
13
Modified HOS based Eigenvector algorithm for improvement of poor SNR of Seismic data
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…The third scheme is a fuzzy logic-based self-adaptive handover (called FuzSAHO) for handover decision to provide an intelligent self-adaptive handover parameters technique based on received signal strength indicator (RSSI) and MS velocity. …”
Get full text
Get full text
Thesis -
16
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
17
Automated multi-agent negotiation framework for the construction domain
Published 2023Conference Paper -
18
-
19
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
20
