Search Results - (( intelligence based rsa algorithm ) OR ( intelligence based malay algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Towards designing a high intelligibility rule based standard malay text-to-speech synthesis system by Ahmad, Zakiah Hanim, Khalifa, Othman Omran

    Published 2008
    “…This paper presents a rule-based text- to- speech synthesis system for Standard Malay, named SMaTTS. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    MOBILE DICTIONARY by Ibrahim, Siti Nabilah

    Published 2005
    “…This paper aims to discover a searching algorithm that can read single and two words (multiword) in a Malay or English language and translate it correctly to another language, either Malay or English. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  12. 12
  13. 13
  14. 14

    Enhancing the natural language processing for Malay language stemming, identifying and correcting misspelled words identifying neologism by Surayaini Basri

    Published 2015
    “…The lack of works in building more effective algorithms in performing the stemming process, identifying misspelled words, and identifying neologism has affected the efficiency of retrieving relevant information or articles in Malay language. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Agent architectures (building chatterbot) / Umi Aimah Abu Bakar by Umi Aimah , Abu Bakar

    Published 2003
    “…While MILAH, it has no neural network, no complex knowledge presentation, no fuzzy logic, no genetic algorithm and no major parsing. MILAH uses Case Based Reasoning (CBR). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Fakebuster: fake news detection system using logistic regression technique in machine learning by Mokhtar, Muhammad Syahmi, Jusoh, Yusmadi Yah, Admodisastro, Novia, Che Pa, Noraini, Amruddin, Amru Yusrin

    Published 2019
    “…Fake news can be certainly solved by the aid of artificial intelligence which includes machine learning algorithms. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20