Search Results - (( intelligence based isms algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- isms algorithm »
- rsa algorithm »
- based isms »
- based rsa »
-
1
Improvement on agglomerative hierarchical clustering algorithm based on tree data structure with bidirectional approach
Published 2024Conference Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
Proposal for ontology based approach to fuzzy student model design
Published 2014Get full text
Get full text
Conference or Workshop Item -
4
Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Advances in Particle Swarm Algorithms in Asynchronous, Discrete and Multi-Objective Optimization
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
7
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
8
Fault detection with optimum March Test Algorithm
Published 2012Get full text
Conference or Workshop Item -
9
Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
An Analysis on the Number of Agents Towards the Performance of the Simulated Kalman Filter Optimizer
Published 2018Get full text
Get full text
Conference or Workshop Item -
12
Modeling and simulation of WSNs for agriculture applications using dynamic transmit power control algorithm
Published 2013Get full text
Working Paper -
13
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
14
Fuzzy Platform for Embedded Wearable EEG Seizure Detection in Ambulatory State
Published 2014Get full text
Get full text
Conference or Workshop Item -
15
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
16
Disturbance rejection for a 2-DOF nonlinear helicopter model by using MIMO fuzzy sliding mode control with boundary layer
Published 2012Get full text
Get full text
Conference or Workshop Item
