Search Results - (( intelligence based rsa algorithm ) OR ( intelligence a true algorithm ))
Search alternatives:
- intelligence based »
- intelligence a »
- true algorithm »
- rsa algorithm »
- based rsa »
- a true »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
A true annealing approach to the marriage in honey-bees optimization algorithm
Published 2003“…Marriage in Honey-Bees Optimization is a new swarm intelligence technique inspired by the marriage process of honey-bees. …”
Get full text
Get full text
Get full text
Article -
3
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
4
Development of an intelligent information system for financial analysis depend on supervised machine learning algorithms
Published 2022“…© 2022…”
Get full text
Get full text
Article -
5
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
6
Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman
Published 2020“…The most common pathfinding algorithm used in video game is A*. Even though A* is the most popular algorithm amongst game developers, it's hardly the best algorithm in finding the true shortest path. …”
Get full text
Get full text
Thesis -
7
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
10
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
11
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…Erroneous readings pose a high risk in many situations and affect the network’s reliability, necessitating a solution to distinguish between true and faulty events. …”
Get full text
Get full text
Article -
12
Combined generative adversarial network and fuzzy C-means clustering for multi-class voice disorder detection with an imbalanced dataset
Published 2020“…To explain the necessity of CGAN and IFCM, a comparison is made between the algorithm with CGAN and that without CGAN. …”
Get full text
Get full text
Article -
13
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
14
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…Significant modifications to the basic Jaya algorithm are done to create a modified Jaya (MJaya) algorithm that can handle the MOOPF problem. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Recognition of human motion from qualitative normalised templates
Published 2007Get full text
Get full text
Article -
17
-
18
-
19
Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems
Published 2020“…Harris’s hawk multi-objective optimizer (HHMO) algorithm is a MOSIbased algorithm that was developed based on the reference point approach. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Potential of Metal Artifact Reduction (MAR) and Deep Learning-based Reconstruction (DLR) algorithms integration in CT Metal Artifact Correction: a review
Published 2024“…Current DLR implementations like TrueFidelity and Advanced Intelligent Clear-IQ Engine (AiCE) demonstrate promising outcomes. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
