Search Results - (( intelligence based rsa algorithm ) OR ( intelligence based double algorithm ))
Search alternatives:
- intelligence based »
- double algorithm »
- rsa algorithm »
- based double »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
-
3
-
4
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
5
Hub Angle Control of Double Link Flexible Robotic Arm Manipulator Using PID Controller Tuned by Bacterial Foraging Optimization Algorithm
Published 2023“…BFOA is a new swarm intelligence optimization algorithm based on E. Coli’s foraging behavior. …”
Get full text
Get full text
Get full text
Proceeding -
6
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Problem-solving method with semantic net based on DNA computing in artificial intelligence
Published 2004“…Proposed problem-solving method is performed by DNA-based computer for a future generation of artificial intelligence.…”
Get full text
Get full text
Get full text
Book Section -
8
-
9
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
10
Interactive design psychology and artificial intelligence-based innovative exploration of Anglo-American traumatic narrative literature
Published 2022“…First, by studying natural language processing (NLP) technology, this study proposes a modification language model (LM) based on the double-layered recurrent neural network (RNN) algorithm and constructs an intelligent language modification system based on the improved LM model. …”
Get full text
Get full text
Article -
11
Fault detection with optimum March Test Algorithm
Published 2012Get full text
Conference or Workshop Item -
12
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
13
Deep-learning-based detection of missing road lane markings using YOLOv5 algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
-
16
Two-Wheeled Wheelchair Stabilization Control Using Fuzzy Logic Controller Based Particle Swarm Optimization
Published 2016Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Plate number recognition systems based on a contours and character recognition approach
Published 2019“…Suggested future studies include a focus on segmenting double row license plates and recognizing similar characters.…”
Get full text
Get full text
Get full text
Get full text
Article -
18
High-resolution HPV genotyping uncovers genotype-specific trends
Published 2025Get full text
Get full text
Get full text
Proceeding Paper -
19
White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman
Published 2019“…The selected most optimized models were then used to classify between healthy trees and white root infected trees based on single input, double input and triple input categories. …”
Get full text
Get full text
Thesis
