Search Results - (( intelligence based data algorithm ) OR ( intelligence _ ((data algorithm) OR (rsa algorithm)) ))
Search alternatives:
- intelligence based »
- data algorithm »
- rsa algorithm »
-
1
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
2
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
Published 2019“…In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amount of energy, especially during the training phase. …”
Get full text
Get full text
Article -
3
Time series data intelligent clustering algorithm for landslide displacement prediction
Published 2018“…To address this problem, an intelligent clustering algorithm for time series data in landslide displacement prediction based on nonlinear dynamic time bending is proposed in this paper. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
5
A theoretical framework for big data analytics based on computational intelligent algorithms with the potential to reduce energy consumption
Published 2019“…In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amount of energy, especially during the training phase. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
6
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Whereas the process of examining through the web pages, retrieving and searching the relevant data in a liTML page, and selecting the best satisfying data are based on the features and operations of the Genetic Algorithms.…”
Get full text
Get full text
Thesis -
8
Improvement on agglomerative hierarchical clustering algorithm based on tree data structure with bidirectional approach
Published 2024Subjects:Conference Paper -
9
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
10
An intelligent system based on kernel methods for crop yield prediction
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Development of an intelligent prediction tool for rice yield based on machine learning techniques
Published 2006“…Whereas kernel-based clustering algorithm is developed for finding clusters in climate data. …”
Get full text
Get full text
Article -
12
Healthy Lifestyle Management System
Published 2011“…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
Get full text
Get full text
Final Year Project -
13
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
Get full text
Get full text
Article -
14
A Novel Hybrid Evolutionary Data-Intelligence Algorithm for Irrigation and Power Production Management: Application to Multi-Purpose Reservoir Systems
Published 2019“…The excellent proficiency of the developed intelligence expert system is the result of the hybrid structure of the BA and PSO algorithm and the substitution of weaker solutions in each algorithm with better solutions from other algorithms. …”
Get full text
Get full text
Article -
15
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
16
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…In this study an intelligent learning system was developed to automate the collection of the machining data used by the skilled machinist. …”
Get full text
Get full text
Thesis -
17
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
Published 2021“…However, the massive amount of data from threat intelligence feeds for CTI is sketchy and not dependable in terms of quality. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024Subjects: “…Artificial Intelligent Algorithms…”
Article -
19
Development of an intelligent system using Kernel-based learning methods for predicting oil-palm yield.
Published 2005“…In this paper we present a robust weighted kernel k-means algorithm incorporating spatial constraints for clustering climate data. …”
Get full text
Get full text
Article -
20
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
