Search Results - (( intelligence based rsa algorithm ) OR ( intelligence based index algorithm ))
Search alternatives:
- intelligence based »
- index algorithm »
- rsa algorithm »
- based index »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Indexer" to decide and index the relevant web pages, and ''Search algorithm" to retrieve the data from the results of indexing. …”
Get full text
Get full text
Thesis -
4
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Healthy Lifestyle Management System
Published 2011“…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
Get full text
Get full text
Final Year Project -
6
Solving university examination timetabling problem using intelligent water drops algorithm
Published 2024Conference Paper -
7
Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm
Published 2017“…These two algorithms are compared to their original artificial intelligence algorithms, i.e. particle swarm optimization algorithm and genetic algorithm. …”
Get full text
Get full text
Thesis -
8
-
9
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
10
-
11
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
12
-
13
-
14
-
15
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010Get full text
Get full text
Get full text
Citation Index Journal -
16
Computational intelligence based power tracing for nondiscriminatory losses charge allocation and voltage stability improvement. / Zulkifli Abdul Hamid
Published 2013“…Subsequently, the developed tracing algorithm was modified in the context of stability index tracing……”
Get full text
Get full text
Book Section -
17
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…Subsequently, the developed tracing algorithm was modified in the context of stability index tracing. …”
Get full text
Get full text
Thesis -
18
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…Subsequently, the developed tracing algorithm was modified in the context of stability index tracing. …”
Get full text
Get full text
Thesis -
19
-
20
Improvement on agglomerative hierarchical clustering algorithm based on tree data structure with bidirectional approach
Published 2024Conference Paper
