Search Results - (( intelligence based blend algorithm ) OR ( intelligence _ rsa algorithm ))
Search alternatives:
- intelligence based »
- blend algorithm »
- rsa algorithm »
- based blend »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
Computational intelligence based power tracing for nondiscriminatory losses charge allocation and voltage stability improvement. / Zulkifli Abdul Hamid
Published 2013“…The hybrid algorithm is termed as the Blended Crossover Continuous Ant Colony Optimization (BX-CACO). …”
Get full text
Get full text
Book Section -
4
-
5
Advancements and challenges in mobile robot navigation: a comprehensive review of algorithms and potential for self-learning approaches
Published 2024“…With the goal of enhancing the autonomy in mobile robot navigation, numerous algorithms (traditional AI-based, swarm intelligence-based, self-learning-based) have been built and implemented independently, and also in blended manners. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Automated multi-agent negotiation framework for the construction domain
Published 2023Conference Paper -
7
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
8
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…The hybrid algorithm is termed as the Blended Crossover Continuous Ant Colony Optimization (BX-CACO). …”
Get full text
Get full text
Thesis -
9
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…The hybrid algorithm is termed as the Blended Crossover Continuous Ant Colony Optimization (BX-CACO). …”
Get full text
Get full text
Thesis -
10
Artificial immune algorithm based gravimetric fluid dispensing machine
Published 2023Conference Paper -
11
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
13
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The simulation results show the AMS algorithm significantly improves the performance over RSA-MSDU and the standard for real-time traffic in terms of reducing average delay and packet loss up to 56% and 24% respectively. …”
Get full text
Get full text
Thesis -
14
Development of electronic nose for classification of aromatic herbs using Artificial Intelligent techniques
Published 2018“…The herb leaves were blended as a mechanism in sample preparation was found as a preeminent procedure to overcome the drawback of the existing system. …”
Get full text
Get full text
Get full text
Article
