Search Results - (( intelligence based firms algorithm ) OR ( intelligence based rsa algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2
  3. 3

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  6. 6

    Artificial intelligence system for pineapple variety classification and its quality evaluation during storage using infrared thermal imaging by Mohd Ali, Maimunah

    Published 2022
    “…In the present study, infrared thermal imaging was used to determine the variety classification and quality attributes of pineapples, specifically total soluble solids (TSS), moisture content, pH, colour changes, and firmness based on various storage conditions (storage temperatures and storage days). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET by JUBAIR, MOHAMMED AHMED, Mostafa, Salama A., ZEBARI, DILOVAN ASAAD, HARIZ, HUSSEIN MUHEE, ABDULSATTAR, NEJOOD FAISAL, HASSAN, MUSTAFA HAMID, ABBAS, ALI HASHIM, ABBAS, FATIMA HASHIM, ALASIRY, AREEJ, ALOUANE, M. TURKI-HADJ

    Published 2022
    “…The CH selection module based on QoS parameters attempts to provide reliable and stable clusters and improve the firmness and connectivity during the communication process of the network. …”
    Get full text
    Get full text
    Article
  9. 9

    A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs by JUBAIR, MOHAMMED AHMED, A. MOSTAFA, SALAMA, DZEBARI, DILOVAN ASAAD, MUHEE HARIZ, HUSSEIN, ABDULSATTAR, NEJOOD FAISAL, HASSAN, MUSTAFA HAMID, ABBAS, ALI HASHIM, HASHIM ABBAS, FATIMA, ALASIRY, AREEJ, ALOUANE, M. TURKI-HADJ

    Published 2023
    “…The CH selection module based on QoS parameters attempts to provide reliable and stable clusters and improve the firmness and connectivity during the communication process of the network. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12