Search Results - (( intelligence based firms algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- firms algorithm »
- rsa algorithm »
- based firms »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
5
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
6
Artificial intelligence system for pineapple variety classification and its quality evaluation during storage using infrared thermal imaging
Published 2022“…In the present study, infrared thermal imaging was used to determine the variety classification and quality attributes of pineapples, specifically total soluble solids (TSS), moisture content, pH, colour changes, and firmness based on various storage conditions (storage temperatures and storage days). …”
Get full text
Get full text
Thesis -
7
IOT Based Smart Wastewater Treatment Model for Industry 4.0 Using Artificial Intelligence
Published 2022“…Wastewater is created by pharma firms and has become a huge worry for the ecosystem. …”
Get full text
Get full text
Article -
8
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET
Published 2022“…The CH selection module based on QoS parameters attempts to provide reliable and stable clusters and improve the firmness and connectivity during the communication process of the network. …”
Get full text
Get full text
Article -
9
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
Published 2023“…The CH selection module based on QoS parameters attempts to provide reliable and stable clusters and improve the firmness and connectivity during the communication process of the network. …”
Get full text
Get full text
Article -
10
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
Published 2022“…The CH selection module based on QoS parameters attempts to provide reliable and stable clusters and improve the firmness and connectivity during the communication process of the network. …”
Get full text
Get full text
Article -
11
-
12
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
Published 2022“…The CH selection module based on QoS parameters attempts to provide reliable and stable clusters and improve the firmness and connectivity during the communication process of the network. …”
Get full text
Get full text
Get full text
Article
