Search Results - (( intelligence based rsa algorithm ) OR ( intelligence big path algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1
  2. 2
  3. 3

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development and Integration of Metocean Data Interoperability for Intelligent Operations and Automation Using Machine Learning: A Review by Danyaro, K.U., Hussain, H.H., Abdullahi, M., Liew, M.S., Shawn, L.E., Abubakar, M.Y.

    Published 2022
    “…This slows down provisioning, while the monitoring element of the Metocean data path is partial. In this paper, we demonstrate the capabilities of ML for the development of Metocean data integration interoperability based on intelligent operations and automation. …”
    Get full text
    Get full text
    Article
  5. 5

    Development and Integration of Metocean Data Interoperability for Intelligent Operations and Automation Using Machine Learning: A Review by Danyaro, K.U., Hussain, H.H., Abdullahi, M., Liew, M.S., Shawn, L.E., Abubakar, M.Y.

    Published 2022
    “…This slows down provisioning, while the monitoring element of the Metocean data path is partial. In this paper, we demonstrate the capabilities of ML for the development of Metocean data integration interoperability based on intelligent operations and automation. …”
    Get full text
    Get full text
    Article
  6. 6

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  8. 8

    Enhancing going concern prediction with Anchor explainable AI and attention-weighted XGBoost by Putthiporn Thanathamathee, Siriporn Sawangarreerak, Dinna Nina Mohd Nizam

    Published 2024
    “…The developed Attention-Weighted XGBoost algorithm, targeting essential financial indicators, markedly surpasses traditional approaches in prediction by its 98% accuracy, as evidenced by improved precision and recall. …”
    Get full text
    Get full text
    Get full text
    Article