Search Results - (( intelligence based iris algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- iris algorithm »
- rsa algorithm »
- based iris »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Iris recognition using convolutional neural network / Zhuang Yuan
Published 2018“…The rising of artificial intelligence provides a great opportunity to further popularize iris recognition. …”
Get full text
Get full text
Get full text
Thesis -
3
Eye closure and open detection using Adaptive Thresholding Histogram Enhancement (ATHE) technique and connected components utilisation
Published 2014Get full text
Get full text
Conference or Workshop Item -
4
Feature-based face recognition system using utilized artificial neural network
Published 2010Get full text
Thesis -
5
-
6
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…However the proposed algorithm offers a promising approach to building intelligent systems.…”
Get full text
Get full text
Final Year Project -
7
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
8
A hybrid-based modified adaptive fuzzy inference engine for pattern classification
Published 2011Get full text
Get full text
Conference or Workshop Item -
9
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
Adaptive speech synthesis module with emotional expression
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
12
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
13
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
14
-
15
Development of autonomous radiation mapping robot
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Development of autonomous radiation mapping robot
Published 2017Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
