Search Results - (( intelligence based rsa algorithm ) OR ( intelligence based kit algorithm ))
Search alternatives:
- intelligence based »
- rsa algorithm »
- kit algorithm »
- based rsa »
- based kit »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Efficient transmission based on genetic evolutionary algorithm
Published 2022Get full text
Get full text
Get full text
Get full text
Proceedings -
3
-
4
-
5
-
6
Genetic Algorithm based Chain Leader Election in Wireless Sensor Network for Precision Farming
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
9
Computing non-contactable drowsiness monitoring system with mobile machine vision
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
A genetic algorithm for management of coding resources in VANET
Published 2017Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
14
On-demand priority traffic optimizer with fuzzy logic microcontroller
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
16
-
17
Rehabilitation and home health monitoring Based-AI scheduling application for coronary artery disease and cardiovascular patients
Published 2024“…It will enable the interaction between the smart wearable by using the health kit and artificial intelligence algorithms to schedule the best fit rehabilitation activity based on the patient’s health status and live monitoring by medical practitioners.…”
Get full text
Get full text
Get full text
Article -
18
High-resolution HPV genotyping uncovers genotype-specific trends
Published 2025Get full text
Get full text
Get full text
Proceeding Paper
