Search Results - (( intelligence based rsa algorithm ) OR ( intelligence among three algorithm ))
Search alternatives:
- intelligence based »
- intelligence among »
- three algorithm »
- rsa algorithm »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
5
A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation
Published 2025“…A thematic analysis of 40 peer-reviewed articles was conducted using ATLAS.ti, revealing three dominant research themes: intelligent algorithms, building performance simulation techniques, and adaptive design for climate change. …”
Get full text
Get full text
Get full text
Article -
6
Developing an intelligent system to acquire meeting knowledge in problem-based learning environments
Published 2006“…MALESAbrain1-3 is an intelligent algorithm which originally is designed for problem-based learning (PBL) environment. …”
Get full text
Get full text
Get full text
Article -
7
-
8
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
9
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
10
-
11
-
12
Novel genetic algorithm towards implementing a lining-layout optimization strategy.
Published 2010“…This paper presents the strategies for optimizing planting areas.The three strategies considered for preparing field lining; 1) 600 line-direction 2) selecting the best line-direction for single block and 3) selecting the best line-directions for many separate blocks,might lead to different numbers of trees. …”
Get full text
Get full text
Article -
13
Intelligent Computerised System Towards Implementing a Lining-Layout Optimisation Strategy
Published 2024“…This project presents the strategies for optimizing planting areas. The three strategies considered for preparing field lining; 1) 60' line-direction 2) selecting the best line-direction for single block and 3) selecting the best line-directions for many separate blocks, might lead to different numbers of trees. …”
conference output::conference proceedings::conference paper -
14
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
15
Adaptive load balancing algorithm for wireless distributed computing networks
Published 2016Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Nature-Inspired Drone Swarming for Wildfires Suppression Considering Distributed Fire Spots and Energy Consumption
Published 2024“…Our quantitative tests show that the improved model has the best coverage (95.3%, 84.3% and 65.8%, respectively) compared to two other methods Levy Flight (LF) algorithm and Particle Swarm Optimization (PSO), which use the same initial parameter values. …”
Article -
17
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…The components of the AIRS2 algorithm that pose problems will be modified. This thesis proposes three new hybrid algorithms: The FRA-AIRS2 algorithm uses fuzzy logic to improve data reduction capability of AIRS2 and to solve the linearity problem associated with resource allocation of AIRS. …”
Get full text
Get full text
Thesis -
18
Hybrid intelligent approach for network intrusion detection
Published 2015“…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan
Published 2005“…In this research, special Top-Down methodology has been used to optimize the stepping stone algorithm. It is achieved by analyzing five stepping stone algorithms, in which each algorithm is divided into three main parts. …”
Get full text
Get full text
Thesis -
20
