Search Results - (( intelligence based rsa algorithm ) OR ( intelligence based robust algorithm ))
Search alternatives:
- intelligence based »
- robust algorithm »
- rsa algorithm »
- based rsa »
-
1
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
-
4
Robust multi-user detection based on hybrid grey wolf optimization
Published 2020Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
5
An artificial-intelligence-based approach for audio steganography
Published 2009Get full text
Get full text
Article -
6
A wavelet based watermarking algorithm for video
Published 2005Get full text
Get full text
Conference or Workshop Item -
7
An intelligent system based on kernel methods for crop yield prediction
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
8
An Intelligent Voltage Controller for a PV Inverter System Using Simulated Annealing Algorithm-Based PI Tuning Approach
Published 2017“…This study associates an intelligent voltage controller based PI approach for PV electrical inverter by employing a meta-heuristic optimization algorithmic called a Simulated Annealing (SA) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Application of swarm intelligence optimization on bio-process problems / Mohamad Zihin Mohd Zain
Published 2018“…Multi-objective optimization problems are also addressed by proposing a modified multi-criterion optimization algorithm based on a Pareto-based Particle Swarm Optimization (PSO) algorithm called Multi-Objective Particle Swarm Optimization (MOPSO). …”
Get full text
Get full text
Thesis -
10
Development of a robust intelligent controller for a semi-active car suspension system
Published 2022“…However, the Fuzzy logic algorithm used in the Fuzzy-PID controller cannot be wholly considered as a real-time controller; since it is fuzzy rules are designed offline and according to a previous knowledge base, which may not cope with the instant, unexpected vibrations that may occur. …”
Get full text
Get full text
Thesis -
11
Intelligent material handling mobile robot for industrial purpose with active force control capability
Published 2005“…An integrated kinematic and dynamic control with embedded intelligent algorithms were the main approaches employed for the robust motion control of a mobile manipulator (MM) comprising a differentially driven wheeled mobile base platform with a two-link planar arm mounted on top of the platform. …”
Get full text
Get full text
Monograph -
12
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
13
Enhancement and assessment of WKS variance parameter for intelligent 3D shape recognition and matching based on MPSO
Published 2017“…This paper presents an improved wave kernel signature (WKS) using the modified particle swarm optimization (MPSO)-based intelligent recognition and matching on 3D shapes. …”
Get full text
Get full text
Article -
14
-
15
-
16
-
17
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
-
19
An attack proof intelligent digital watermarking based on safe region of fast fourier transform
Published 2010“…We propose a method, an attack proof intelligent system, in which Artificial Neural network is use to locate the Safe Region in the host image and the watermark is embedded based on the located Safe Region in Fast Fourier Transform domain. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Empirical robustness evaluation of DNA-based clustering methods
Published 2011Get full text
Get full text
Get full text
Article
