Search Results - (( intelligence based rsa algorithm ) OR ( intelligence a data algorithm ))*
Search alternatives:
- intelligence based »
- intelligence a »
- data algorithm »
- rsa algorithm »
- based rsa »
- a data »
-
1
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
2
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
4
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
6
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
Published 2019“…In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. …”
Get full text
Get full text
Article -
7
A theoretical framework for big data analytics based on computational intelligent algorithms with the potential to reduce energy consumption
Published 2019“…In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
8
Investigating the Application of Artificial Intelligence for Earthquake Prediction in Terengganu
Published 2023text::Thesis -
9
A Comparison Between Levenberg-Marquardt (LM) Intelligent System And Bayesian Regularization (BR) Intelligent System For Flow Regime Classification
Published 2006“…The comparison made showed that LM learning algortihm is a faster training algorithm compared to BR training algorithm meanwhile BR learning algorithm capable of building a superior intelligent system in term of the overall system performance.…”
Get full text
Get full text
Monograph -
10
Improvement on agglomerative hierarchical clustering algorithm based on tree data structure with bidirectional approach
Published 2024Conference Paper -
11
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Whereas the process of examining through the web pages, retrieving and searching the relevant data in a liTML page, and selecting the best satisfying data are based on the features and operations of the Genetic Algorithms.…”
Get full text
Get full text
Thesis -
12
-
13
An Intelligent Data-Driven Approach for Electrical Energy Load Management Using Machine Learning Algorithms
Published 2022“…This fusion of data science, artificial intelligence, and electrical energy management has turned out to be the most precise and robust energy management solution. …”
Get full text
Get full text
Get full text
Article -
14
A Novel Hybrid Evolutionary Data-Intelligence Algorithm for Irrigation and Power Production Management: Application to Multi-Purpose Reservoir Systems
Published 2019“…Multi-purpose advanced systems are considered a complex problem in water resource management, and the use of data-intelligence methodologies in operating such systems provides major advantages for decision-makers. …”
Get full text
Get full text
Article -
15
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
Published 2021“…Data collected from various sources underwent preprocessing state to prepare a required data format for data analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…A Comparison between the learned target machining data and data from MDH shows a low percentage of error. …”
Get full text
Get full text
Thesis -
17
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…It is significant to process and analyse electric power production data to diagnose a fault. High levels of informa-tionalisation and intellectualization can be achieved in the actual details of developing a Power Plant Fault Diagnosis Management System. …”
Article -
18
An intelligent system based on kernel methods for crop yield prediction
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…In this direction, this paper first gives review of some previous scheduling algorithms used in cloud. Then, it proposes a type of swarm intelligence called Particle Swarm Optimization (PSO) algorithm to diminish cost though meeting deadlines. …”
Get full text
Get full text
Get full text
Article -
20
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
Get full text
Get full text
Thesis
