Search Results - (( intelligence based alarm algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- alarm algorithm »
- rsa algorithm »
- based alarm »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis -
3
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…The framework shares information through the algorithm and communicates with each fire alarm panels connected in peer to peer configuration to declare the network state in every second using network address. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Hybrid intelligent approach for network intrusion detection
Published 2015“…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Rabies Outbreak Prediction Using Deep Learning with Long Short-Term Memory
Published 2020Get full text
Get full text
Get full text
Book Chapter -
7
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
8
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
9
Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation
Published 2017“…An integrated Fire Detection and Alarm (FDA) systems with building automation was studied, to reduce cost and improve their reliability by preventing false alarm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Artificial Intelligence Application in Power Generation Industry: Initial considerations
Published 2023Conference Paper -
11
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
-
13
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
14
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…The result has shown that this algorithm has increased the detection rate and reduced the false alarm rate compared with Fuzzy-ART.…”
Get full text
Get full text
Get full text
Article -
15
Video surveillance: Item monitoring against theft
Published 2023“…All the mentioned counters will be set to 0 if the conditions specified are not met. Based on the predetermined conditions for each type of risk, the appropriate alarms will be activated while a risk occurs. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
18
-
19
-
20
A comparative study of MPPT and voltage regulator controllers for controlling output voltage in PV applications
Published 2019“…However, most of the algorithms such as artificial intelligence and expert systems need high-end computing systems, which are costly and thus not suitable for normal household utilization. …”
Get full text
Get full text
Get full text
Get full text
Thesis
