Search Results - (( intelligence based rsa algorithm ) OR ( intelligence ai force algorithm ))
Search alternatives:
- intelligence ai »
- force algorithm »
- rsa algorithm »
- based rsa »
- ai force »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Prediction of Optimum Cutting Conditions in Dry Turning Operations of S45C Mild Steel using AIS and PSO Intelligent Algorithm
Published 2014“…Experimental results showed that the average accuracy of the AIS algorithm is 94.37 %, whereas that of the PSO algorithm is 92.84 % which indicated that the two percentages are convergent.…”
Get full text
Get full text
Conference or Workshop Item -
3
Al-Istikhlāf framework in the age of artificial intelligence: reclaiming the human identity and responsibility in the digital era
Published 2025“…Artificial intelligence (AI) has emerged as one of the most disruptive forces of the twenty-first century, reshaping cultures, economies, social relations, and even the definition of human intelligence, creativity, and knowledge. …”
Get full text
Get full text
Get full text
Article -
4
Artificial Intelligence Integration in Mobile Applications: Innovation and Challenges in Supporting Quran Memorization and Review
Published 2025journal::journal article -
5
Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih
Published 2019“…Since Constraint Satisfaction Problem (CSP) is an NP-complete problem, brute-force search algorithms such as Backtracking algorithm (BT) are required as the guarantee to find a solution, when there is one. …”
Get full text
Get full text
Thesis -
6
Digital Transformation Using Industry 4.0 and Artificial Intelligence
Published 2025“…Explainable artificial intelligence (XAI) conducts studies and creates tools, techniques, and algorithm designs that produce information and judgments made by AI-based systems that are comprehensible to humans. …”
Book chapter -
7
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
8
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
A review of classification techniques for electromyography signals
Published 2023“…Machine Learning (ML) is an area of Artificial Intelligent (AI) with a concept that a computer program can learn and familiarize to new data without human intervention. …”
Get full text
Get full text
Get full text
Article -
10
Improvement Performance Characteristics of CNC Turning Operation by Exploit Immune System's Properties
Published 2013“…This paper presents the application of artificial immune system (AIS) intelligent algorithm for multiple output optimization of two passes dry CNC turning operation. …”
Get full text
Get full text
Conference or Workshop Item -
11
Intelligent motion planning of a mobile robot by using convolutional neural network / Siti Asmah Abdullah
Published 2019“…Optimizing the cost in every aspect is important in the implementation of artificial intelligence (A.I.) without affecting the accuracy of the output. …”
Get full text
Get full text
Get full text
Thesis -
12
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
13
Minimization of tool path length of drilling process using particle swarm optimization (PSO)
Published 2020“…In various publications and articles, scientists and researchers adapted several methods of artificial intelligence (AI) or hybrid optimization method for tool path artificial immune system (AIS), genetic algorithms (GA), Artificial Neural networks (ANN) Ant Colony Optimization (ACO) and Particle Swarm Optimization (PSO) (Narooei and Ramli, 2014). …”
Get full text
Get full text
Book Section -
14
AI technology factors mediated via intention to use in UAE petroleum companies case study
Published 2024“…Artificial Intelligence (AI) represents a transformative force globally, with its computational prowess, data accessibility, and revolutionary algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
16
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…Digitization has pioneered to drive exceptional changes across all industries in the advancement of analytics, automation, and Artificial Intelligence (AI) and Machine Learning (ML). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
