Search Results - (( intelligence based rsa algorithm ) OR ( intelligence among method algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Bats echolocation-inspired algorithms for global optimisation problems by Nafrizuan, Mat Yahya

    Published 2016
    “…Swarm intelligence algorithms, are among popular metaheuristic methods, developed and inspired by the collective behaviour of swarms that have attracted significant attention of researchers. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif by Jantan, Hamidah, Mat Yusof, Norazmah, Abdul Latif, Mohd Hanapi

    Published 2014
    “…By implementing soft computing techniques in data mining especially in HR field can enhance the knowledge discovery process for intelligent decision system. Support Vector Machine (SVM) is among the popular learning algorithm for classification in soft computing techniques. …”
    Get full text
    Get full text
    Research Reports
  7. 7

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  8. 8

    A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation by Rong, Li, Shari, Zalina, Ab Kadir, Mohd Zainal Abidin

    Published 2025
    “…A thematic analysis of 40 peer-reviewed articles was conducted using ATLAS.ti, revealing three dominant research themes: intelligent algorithms, building performance simulation techniques, and adaptive design for climate change. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Problem-solving method with semantic net based on DNA computing in artificial intelligence by Tsuboi, Yusei, Ibrahim, Zuwairie, Ono, Osamu

    Published 2004
    “…Semantic Net is among the problem solving systems in artificial intelligence fields. …”
    Get full text
    Get full text
    Get full text
    Book Section
  10. 10

    A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani by Mahmoud Reza, Saybani

    Published 2016
    “…The increasing size of data being stored have created the need for computer-based methods for automatic data analysis. Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Nature-Inspired Drone Swarming for Wildfires Suppression Considering Distributed Fire Spots and Energy Consumption by Alsammak I.L.H., Mahmoud M.A., Gunasekaran S.S., Ahmed A.N., Alkilabi M.

    Published 2024
    “…Our quantitative tests show that the improved model has the best coverage (95.3%, 84.3% and 65.8%, respectively) compared to two other methods Levy Flight (LF) algorithm and Particle Swarm Optimization (PSO), which use the same initial parameter values. …”
    Article
  12. 12
  13. 13

    Performance Comparison Of Intelligent Tuning Methods Using Pid-Afcga And Pid-Afcpso In Attenuating The Vibration Of The Suspended Handle Model by Choo, Kinn

    Published 2021
    “…AFC with intelligent tuning method is a promising solution for the vibration control especially in power tool application.…”
    Get full text
    Get full text
    Monograph
  14. 14
  15. 15

    Efficiency improvement of a standalone photovoltaic system using fuzzy-based maximum power point tracking algorithm by Alhamdawee, Ehsan Mohsin Obaid

    Published 2016
    “…MPPT algorithms can be categorized into classical methods and artificial intelligence-based methods. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Feature selection has decreased the features from 41 to 21 features for intrusion detection and later normalization method is employed to perform and reduce the differences among the data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Artificial intelligence in diagnosing tuberculosis: a review by Meraj, Syeda Shaizadi, Yaakob, Razali, Azman, Azreen, Mohd Rum, Siti Nurulain, Ahmad Nazri, Azree Shahrel

    Published 2019
    “…In the past fifty years, due to the advanced and sophisticated technologies, in medical as well as computer science fields, have paved a way to utilize the essence of both the areas. In Artificial Intelligence (AI) various Machine Learning (ML) algorithms have furthered the interests in Computer-aided Detection (CADe) and Diagnosis (CADx) methods. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…The method of discovering the distance relay decision algorithm essentially involved formulating rough set discernibility matrix and function from relay event report, finding reducts of pertinent attributes using genetic algorithm and finally generating relay prediction rules. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    The Implementation of Genetic Algorithm in Path Optimization by Jumali, Suriana

    Published 2005
    “…Experiments were conducted to measure the effectiveness of two different types of mutation method namely swapping method and inversion method. …”
    Get full text
    Get full text
    Final Year Project
  20. 20