Search Results - (( intelligence based leaf algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- leaf algorithm »
- rsa algorithm »
- based leaf »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Improvement on agglomerative hierarchical clustering algorithm based on tree data structure with bidirectional approach
Published 2024Conference Paper -
3
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Plant leaf recognition algorithm using ant colony-based feature extraction technique
Published 2013“…To do this, at first, based on the proposed algorithm,the physiological dimensions of leaves are automatically measured and with regard to these parameters, specified features such as shape, morph, texture and colour are extracted from the image of the plant leaf through image processing to create a reserved feature database to be used for different species of plants. …”
Get full text
Get full text
Thesis -
6
Machine learning in medicinal plants recognition: a review
Published 2020Get full text
Get full text
Get full text
Article -
7
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
8
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
9
Disease detection of solanaceous crops using deep learning for robot vision
Published 2022“…In addition, the output of this study is expected to become the algorithm of the robot's vision. This study uses images of four crops (tomato, potato, eggplant, and pepper), including 23 classes of healthy and diseased crops infected on the leaf and fruits. …”
Get full text
Get full text
Get full text
Article
