Search Results - (( intelligence based rsa algorithm ) OR ( intelligence _ acs algorithm ))
Search alternatives:
- intelligence based »
- rsa algorithm »
- acs algorithm »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Hybrid ant colony system algorithm for static and dynamic job scheduling in grid computing
Published 2015“…The algorithms are ACS(GA), ACS+GA, ACS(TS), and ACS+TS. …”
Get full text
Get full text
Get full text
Thesis -
3
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Attitude Control System for InnoSAT
Published 2009“…To develop attitude control algorithms software; ACS is the part of the ADCS payload. …”
Get full text
Other -
6
-
7
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Hybridization of enhanced ant colony system and Tabu search algorithm for packet routing in wireless sensor network
Published 2020“…This research proposes a hybridization of Enhanced ACS and Tabu Search (EACS(TS)) algorithm for packet routing in WSN. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Optimised intelligent tilt controller scheme using genetic algorithms
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
15
A speech recognition system based on structure equivalent fuzzy neural network trained by firefly algorithm
Published 2012Get full text
Working Paper -
16
-
17
Improved Dynamic Ant Colony System (DACS) on Symmetric Traveling Salesman Problem (TSP).
Published 2007Get full text
Get full text
Conference or Workshop Item -
18
-
19
-
20
