Search Results - (( intelligence based rsa algorithm ) OR ( intelligence a access algorithm ))

Refine Results
  1. 1

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  3. 3
  4. 4
  5. 5

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…As opposed to the traditional circulatory mechanism, a software agent is designed to become an intelligent circulatory agent is this research. …”
    Get full text
    Get full text
    Article
  7. 7

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Reference-point modified honey badger algorithm: Intelligent optimization for off-grid photovoltaic system / Nur Atharah Kamarzaman ... [et al.] by Kamarzaman, Nur Atharah, Sulaiman, Shahril Irwan, Yassin, Ahmad Ihsan, Zainuddin, Hedzlin, Ibrahim, Intan Rahayu

    Published 2024
    “…RP-MHBA enhances the conventional Honey Badger Algorithm (HBA) by offering a more comprehensive range of alternative solutions through a Pareto front that trades off between conflicting technical reliability and economic viability, facilitating the discovery of balanced solutions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Artificial intelligent power prediction for efficient resource management of WCDMA mobile network by Tee Y.K., Tinng S.K., Koh J., David Y.

    Published 2023
    “…This artificial intelligent call admission control (CAC) was validated using a dynamic WCDMA mobile network simulator. …”
    Conference Paper
  13. 13
  14. 14
  15. 15
  16. 16

    Enhanced hierarchical dynamic bandwidth allocation algorithm with excess bandwidth and SLA techniques for upstream ethernet PON by Sadon S.Kh., Radzi N.A.M., Din N.M., Mustafa I.S., Al-Mansoori M.H., Yaacob M.

    Published 2023
    “…Passive Optical Networks (PONs) are thought to be the next step in the development of Access Networks and providing broadband access in the "last mile" area. …”
    Conference paper
  17. 17
  18. 18

    General purpose search and classification algorithms for distributed information access by Siraj, Fadzilah, Wan Ishak, Wan Hussain

    Published 2000
    “…Previous and current research on search engines and information retrieval show that Artificial Intelligence technique is one of the recommended solutions in providing the most relevant, timely and efficient search results for the user.This paper proposed a search engine model that incorporated Artificial Intelligence techniques.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20