Search Results - (( intelligence based rsa algorithm ) OR ( intelligence among process algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif by Jantan, Hamidah, Mat Yusof, Norazmah, Abdul Latif, Mohd Hanapi

    Published 2014
    “…By implementing soft computing techniques in data mining especially in HR field can enhance the knowledge discovery process for intelligent decision system. Support Vector Machine (SVM) is among the popular learning algorithm for classification in soft computing techniques. …”
    Get full text
    Get full text
    Research Reports
  5. 5

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…Various Artificial Intelligent (AI) algorithms can be applied in solving optimization problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  10. 10
  11. 11

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Soft computing techniques, such as bio-inspired algorithms, can be used for information processing by employing methods which are capable to deal with imprecision and uncertainty. …”
    Get full text
    Get full text
    Research Reports
  12. 12
  13. 13

    Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State by Far Chen, Jong

    Published 2022
    “…It is followed by identifying RES sites using spatial data and Multi-Criteria Decision Making-Analytical Hierarchy Process (MCDM-AHP) algorithm. Accordingly, Spatial-Artificial Intelligence (AI) approach is utilised to integrate a high number of RES sites with minimum total distance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks by Moghanjoughi, Ayyoub Akbari

    Published 2009
    “…Also the main aim of this research is to solve the freezing problem during optimum as well as sub-optimum path discovery process. In this research, Intelligent AntNet based Routing Algorithm (IANRA) is presented for routing in WMNs and MANET to find optimum and near-optimum paths for data packet routing. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Feature selection has decreased the features from 41 to 21 features for intrusion detection and later normalization method is employed to perform and reduce the differences among the data. Clustering is the last step of processing before classification has been performed, using k-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…Nowadays protection engineers are suffering from very complex implementations of protection system analysis due to massive quantities of data coming from diverse points of intelligent electronic devices. In helping the protection engineers deal with this overwhelming data, this study relied merely on digital protective relay’s recorded event report because, among other intelligent electronic devices, digital protective relay sufficiently provided virtually most attributes needed for data mining process in knowledge discovery in database. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani by Mahmoud Reza, Saybani

    Published 2016
    “…Results of AIRS have shown its potential for classification purposes. AIRS is an intelligent classifier offering robust and powerful information processing capabilities and is becoming steadily an effective branch of computational intelligence. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Novel genetic algorithm towards implementing a lining-layout optimization strategy. by Md Badarudin, Ismadi, Md Sultan, Abu Bakar, Sulaiman, Md. Nasir, Mamat, Ali, Tengku Muda Mohamed, Mahmud

    Published 2010
    “…Because there are many possible solutions with ambiguous results, a novelty of Genetic Algorithm (GA) for lining-layout with focusing on the two approaches which are 1) assigning the determined random values to the genes of chromosome, 2)avoiding the same solution of optimal blocks occurs, was applied to suggest the optimal solution intelligently. …”
    Get full text
    Get full text
    Article
  20. 20

    Intelligent Computerised System Towards Implementing a Lining-Layout Optimisation Strategy by A.B. Md Sultan; , I. Md. Badrudin;, M.N. Sulaiman;, A. Mamat;, M. Tengku Muda Mohamed

    Published 2024
    “…Because there are many possible solutions with ambiguous results, a novelty of Genetic Algorithm (GA) for lining-layout with focusing on the two approaches which are assigning the determined random values to the genes of chromosome and avoiding the same solution of optimal blocks occurs, was applied to suggest the optimal solution intelligently. …”
    conference output::conference proceedings::conference paper