Search Results - (( intelligence based rsa algorithm ) OR ( intelligence al tree algorithm ))
Search alternatives:
- intelligence based »
- intelligence al »
- tree algorithm »
- rsa algorithm »
- based rsa »
- al tree »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Cancer Prediction Based On Data Mining Using Decision Tree Algorithm
Published 2022Get full text
Get full text
Undergraduates Project Papers -
4
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
7
A Robust Graph Theoretic Solution of Routing in Intelligent Networks
Published 2022“…© 2022 Muhammad Aasim Qureshi et al.…”
Get full text
Get full text
Article -
8
A hybrid deep CNN model for fast class-incremental food classification / Aymen Taher Ahmed al-Ashwal
Published 2019“…Lastly, the incremental learning algorithm ABACOC is used to classify each feature of food classes. …”
Get full text
Get full text
Get full text
Thesis -
9
Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.]
Published 2021Get full text
Get full text
Conference or Workshop Item -
10
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
11
-
12
Network bandwidth utilization based on collaborative web caching using machine learning algorithms in peer-to-peer systems for media web objects
Published 2018“…On the other hand, they do not consider the advantages that can be given by applying these approaches in peer-to-peer systems. In this work, intelligent collaborative web caching approaches based on C4.5 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Thesis -
13
-
14
Water Quality Index Using Modified Random Forest Technique: Assessing Novel Input Features
Published 2024journal::journal article -
15
