Search Results - (( intelligence based rsa algorithm ) OR ( intelligence among process algorithm ))
Search alternatives:
- intelligence based »
- intelligence among »
- process algorithm »
- rsa algorithm »
- among process »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…By implementing soft computing techniques in data mining especially in HR field can enhance the knowledge discovery process for intelligent decision system. Support Vector Machine (SVM) is among the popular learning algorithm for classification in soft computing techniques. …”
Get full text
Get full text
Research Reports -
5
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
6
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
7
-
8
A refined differential evolution algorithm for improving the performance of optimization process
Published 2011“…Various Artificial Intelligent (AI) algorithms can be applied in solving optimization problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
10
-
11
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Soft computing techniques, such as bio-inspired algorithms, can be used for information processing by employing methods which are capable to deal with imprecision and uncertainty. …”
Get full text
Get full text
Research Reports -
12
-
13
Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State
Published 2022“…It is followed by identifying RES sites using spatial data and Multi-Criteria Decision Making-Analytical Hierarchy Process (MCDM-AHP) algorithm. Accordingly, Spatial-Artificial Intelligence (AI) approach is utilised to integrate a high number of RES sites with minimum total distance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks
Published 2009“…Also the main aim of this research is to solve the freezing problem during optimum as well as sub-optimum path discovery process. In this research, Intelligent AntNet based Routing Algorithm (IANRA) is presented for routing in WMNs and MANET to find optimum and near-optimum paths for data packet routing. …”
Get full text
Get full text
Thesis -
15
-
16
Hybrid intelligent approach for network intrusion detection
Published 2015“…Feature selection has decreased the features from 41 to 21 features for intrusion detection and later normalization method is employed to perform and reduce the differences among the data. Clustering is the last step of processing before classification has been performed, using k-means algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Discovering decision algorithm from a distance relay event report
Published 2009“…Nowadays protection engineers are suffering from very complex implementations of protection system analysis due to massive quantities of data coming from diverse points of intelligent electronic devices. In helping the protection engineers deal with this overwhelming data, this study relied merely on digital protective relay’s recorded event report because, among other intelligent electronic devices, digital protective relay sufficiently provided virtually most attributes needed for data mining process in knowledge discovery in database. …”
Get full text
Get full text
Get full text
Article -
18
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…Results of AIRS have shown its potential for classification purposes. AIRS is an intelligent classifier offering robust and powerful information processing capabilities and is becoming steadily an effective branch of computational intelligence. …”
Get full text
Get full text
Thesis -
19
Novel genetic algorithm towards implementing a lining-layout optimization strategy.
Published 2010“…Because there are many possible solutions with ambiguous results, a novelty of Genetic Algorithm (GA) for lining-layout with focusing on the two approaches which are 1) assigning the determined random values to the genes of chromosome, 2)avoiding the same solution of optimal blocks occurs, was applied to suggest the optimal solution intelligently. …”
Get full text
Get full text
Article -
20
Intelligent Computerised System Towards Implementing a Lining-Layout Optimisation Strategy
Published 2024“…Because there are many possible solutions with ambiguous results, a novelty of Genetic Algorithm (GA) for lining-layout with focusing on the two approaches which are assigning the determined random values to the genes of chromosome and avoiding the same solution of optimal blocks occurs, was applied to suggest the optimal solution intelligently. …”
conference output::conference proceedings::conference paper
