Search Results - (( intelligence based rsa algorithm ) OR ( intelligence 21 process algorithm ))
Search alternatives:
- intelligence based »
- process algorithm »
- intelligence 21 »
- rsa algorithm »
- 21 process »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023Conference paper -
5
-
6
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
7
-
8
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
9
-
10
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
11
Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems
Published 2024thesis::doctoral thesis -
12
Intelligent auto tracking in 3D space by image processing
Published 2009Get full text
Get full text
Proceeding Paper -
13
-
14
Intelligent Optimization Systems for MaintenanceScheduling of Power Plant Generators
Published 2024Article -
15
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
16
-
17
-
18
Malaria parasites segmentation in red blood cells images using mean-shift and median-cut
Published 2010Get full text
Get full text
Book Section -
19
-
20
