Search Results - (( intelligence based double algorithm ) OR ( intelligence based rsa algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Problem-solving method with semantic net based on DNA computing in artificial intelligence by Tsuboi, Yusei, Ibrahim, Zuwairie, Ono, Osamu

    Published 2004
    “…Proposed problem-solving method is performed by DNA-based computer for a future generation of artificial intelligence.…”
    Get full text
    Get full text
    Get full text
    Book Section
  8. 8
  9. 9

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Interactive design psychology and artificial intelligence-based innovative exploration of Anglo-American traumatic narrative literature by Hou, Xia, Omar, Noritah, Wang, Jue

    Published 2022
    “…First, by studying natural language processing (NLP) technology, this study proposes a modification language model (LM) based on the double-layered recurrent neural network (RNN) algorithm and constructs an intelligent language modification system based on the improved LM model. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Plate number recognition systems based on a contours and character recognition approach by Chua, Jing Yi, Rechard Lee, Abdullah Bade

    Published 2019
    “…Suggested future studies include a focus on segmenting double row license plates and recognizing similar characters.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman by Sulaiman, Mohd Suhaimi

    Published 2019
    “…The selected most optimized models were then used to classify between healthy trees and white root infected trees based on single input, double input and triple input categories. …”
    Get full text
    Get full text
    Thesis