Search Results - (( intelligence based asms algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- asms algorithm »
- rsa algorithm »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
-
3
Face recognition-based real-time system for surveillance
Published 2017Get full text
Get full text
Article -
4
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
5
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
7
Evolutionary Integrated Heuristic with Gudermannian Neural Networks for Second Kind of Lane–Emden Nonlinear Singular Models
Published 2021“…In this work, a new heuristic computing design is presented with an artificial intelligence approach to exploit the models with feed-forward (FF) Gudermannian neural networks (GNN) accomplished with global search capability of genetic algorithms (GA) combined with local convergence aptitude of active-set method (ASM), i.e., FF-GNN-GAASM to solve the second kind of Lane–Emden nonlinear singular models (LE-NSM). …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
9
Evolutionary integrated heuristic with gudermannian neural networks for second kind of lane– emden nonlinear singular models
Published 2021“…In this work, a new heuristic computing design is presented with an artificial intelligence approach to exploit the models with feed-forward (FF) Gudermannian neural networks (GNN) accomplished with global search capability of genetic algorithms (GA) combined with local convergence aptitude of active-set method (ASM), i.e., FF-GNN-GAASM to solve the second kind of Lane–Emden nonlinear singular models (LE-NSM). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
