Search Results - (( intelligence based rsa algorithm ) OR ( intelligence among method algorithm ))*
Search alternatives:
- intelligence based »
- intelligence among »
- method algorithm »
- rsa algorithm »
- among method »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
5
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…Swarm intelligence algorithms, are among popular metaheuristic methods, developed and inspired by the collective behaviour of swarms that have attracted significant attention of researchers. …”
Get full text
Get full text
Thesis -
6
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…By implementing soft computing techniques in data mining especially in HR field can enhance the knowledge discovery process for intelligent decision system. Support Vector Machine (SVM) is among the popular learning algorithm for classification in soft computing techniques. …”
Get full text
Get full text
Research Reports -
7
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
8
A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation
Published 2025“…A thematic analysis of 40 peer-reviewed articles was conducted using ATLAS.ti, revealing three dominant research themes: intelligent algorithms, building performance simulation techniques, and adaptive design for climate change. …”
Get full text
Get full text
Get full text
Article -
9
Problem-solving method with semantic net based on DNA computing in artificial intelligence
Published 2004“…Semantic Net is among the problem solving systems in artificial intelligence fields. …”
Get full text
Get full text
Get full text
Book Section -
10
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…The increasing size of data being stored have created the need for computer-based methods for automatic data analysis. Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
Get full text
Get full text
Thesis -
11
Nature-Inspired Drone Swarming for Wildfires Suppression Considering Distributed Fire Spots and Energy Consumption
Published 2024“…Our quantitative tests show that the improved model has the best coverage (95.3%, 84.3% and 65.8%, respectively) compared to two other methods Levy Flight (LF) algorithm and Particle Swarm Optimization (PSO), which use the same initial parameter values. …”
Article -
12
-
13
Performance Comparison Of Intelligent Tuning Methods Using Pid-Afcga And Pid-Afcpso In Attenuating The Vibration Of The Suspended Handle Model
Published 2021“…AFC with intelligent tuning method is a promising solution for the vibration control especially in power tool application.…”
Get full text
Get full text
Monograph -
14
-
15
Efficiency improvement of a standalone photovoltaic system using fuzzy-based maximum power point tracking algorithm
Published 2016“…MPPT algorithms can be categorized into classical methods and artificial intelligence-based methods. …”
Get full text
Get full text
Thesis -
16
Hybrid intelligent approach for network intrusion detection
Published 2015“…Feature selection has decreased the features from 41 to 21 features for intrusion detection and later normalization method is employed to perform and reduce the differences among the data. …”
Get full text
Get full text
Get full text
Thesis -
17
Artificial intelligence in diagnosing tuberculosis: a review
Published 2019“…In the past fifty years, due to the advanced and sophisticated technologies, in medical as well as computer science fields, have paved a way to utilize the essence of both the areas. In Artificial Intelligence (AI) various Machine Learning (ML) algorithms have furthered the interests in Computer-aided Detection (CADe) and Diagnosis (CADx) methods. …”
Get full text
Get full text
Get full text
Article -
18
Discovering decision algorithm from a distance relay event report
Published 2009“…The method of discovering the distance relay decision algorithm essentially involved formulating rough set discernibility matrix and function from relay event report, finding reducts of pertinent attributes using genetic algorithm and finally generating relay prediction rules. …”
Get full text
Get full text
Get full text
Article -
19
The Implementation of Genetic Algorithm in Path Optimization
Published 2005“…Experiments were conducted to measure the effectiveness of two different types of mutation method namely swapping method and inversion method. …”
Get full text
Get full text
Final Year Project -
20
