Search Results - (( intelligence based rsa algorithm ) OR ( intelligence ai force algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1
  2. 2

    Prediction of Optimum Cutting Conditions in Dry Turning Operations of S45C Mild Steel using AIS and PSO Intelligent Algorithm by Minhat, Mohamad, Abd Rahman, Md Nizam, Abbas, Adnan Jameel

    Published 2014
    “…Experimental results showed that the average accuracy of the AIS algorithm is 94.37 %, whereas that of the PSO algorithm is 92.84 % which indicated that the two percentages are convergent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Al-Istikhlāf framework in the age of artificial intelligence: reclaiming the human identity and responsibility in the digital era by Wan Ismail, Hidayah, Abdelaziz, Berghout

    Published 2025
    “…Artificial intelligence (AI) has emerged as one of the most disruptive forces of the twenty-first century, reshaping cultures, economies, social relations, and even the definition of human intelligence, creativity, and knowledge. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih by Ahmed Abuluaih, Saajid Akram

    Published 2019
    “…Since Constraint Satisfaction Problem (CSP) is an NP-complete problem, brute-force search algorithms such as Backtracking algorithm (BT) are required as the guarantee to find a solution, when there is one. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Digital Transformation Using Industry 4.0 and Artificial Intelligence by Keerthika M., Pragadeesh M., Santhiya M., Jebamalar G.B., Venu H.

    Published 2025
    “…Explainable artificial intelligence (XAI) conducts studies and creates tools, techniques, and algorithm designs that produce information and judgments made by AI-based systems that are comprehensible to humans. …”
    Book chapter
  7. 7
  8. 8

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A review of classification techniques for electromyography signals by Mohd Saad, Norhashimah, Omar, Siti Nashayu, Abdullah, Abdul Rahim, Shair, Ezreen Farina, H.Rashid

    Published 2023
    “…Machine Learning (ML) is an area of Artificial Intelligent (AI) with a concept that a computer program can learn and familiarize to new data without human intervention. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Improvement Performance Characteristics of CNC Turning Operation by Exploit Immune System's Properties by Jameel Abbas, Adnan, Minhat, Mohamad, Abd. Rahman, Md. Nizam

    Published 2013
    “…This paper presents the application of artificial immune system (AIS) intelligent algorithm for multiple output optimization of two passes dry CNC turning operation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Intelligent motion planning of a mobile robot by using convolutional neural network / Siti Asmah Abdullah by Siti Asmah, Abdullah

    Published 2019
    “…Optimizing the cost in every aspect is important in the implementation of artificial intelligence (A.I.) without affecting the accuracy of the output. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Minimization of tool path length of drilling process using particle swarm optimization (PSO) by Abdullah, Haslina, Zaman, Nizam Nurehsan, Talib, Norfazillah, Lee, Woon Kiow, Saleh, Aslinda, Zakaria, Mohamad Shukri

    Published 2020
    “…In various publications and articles, scientists and researchers adapted several methods of artificial intelligence (AI) or hybrid optimization method for tool path artificial immune system (AIS), genetic algorithms (GA), Artificial Neural networks (ANN) Ant Colony Optimization (ACO) and Particle Swarm Optimization (PSO) (Narooei and Ramli, 2014). …”
    Get full text
    Get full text
    Book Section
  14. 14

    AI technology factors mediated via intention to use in UAE petroleum companies case study by Alblooshi, Surour Mohammed Surour Hamada

    Published 2024
    “…Artificial Intelligence (AI) represents a transformative force globally, with its computational prowess, data accessibility, and revolutionary algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  16. 16

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…Digitization has pioneered to drive exceptional changes across all industries in the advancement of analytics, automation, and Artificial Intelligence (AI) and Machine Learning (ML). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper