Search Results - (( intelligence based rsa algorithm ) OR ( intelligence led _ algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Intelligent guidance parking system using modified Dijkstra's algorithm by Jaafar, Haslina, Zabidi, Muhamad Hidayat, Che Soh, Azura, Thong, Peng Hoong, Shafie, Suhaidi, Ahmad, Siti Anom

    Published 2014
    “…This paper presents the intelligent parking system which apply Dijkstra’s algorithm in finding the shortest path. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  8. 8

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…From the pseudocode of the proposed algorithm, it is observed that the complexity of the algorithm is O(n) which is linear, hence the response time is considered good. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…Recent advances in robotics and machine intelligence have led to the application of modern optimization method such as the genetic algorithm (GA), to solve the path-planning problem. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Novel genetic algorithm towards implementing a lining-layout optimization strategy. by Md Badarudin, Ismadi, Md Sultan, Abu Bakar, Sulaiman, Md. Nasir, Mamat, Ali, Tengku Muda Mohamed, Mahmud

    Published 2010
    “…Because there are many possible solutions with ambiguous results, a novelty of Genetic Algorithm (GA) for lining-layout with focusing on the two approaches which are 1) assigning the determined random values to the genes of chromosome, 2)avoiding the same solution of optimal blocks occurs, was applied to suggest the optimal solution intelligently. …”
    Get full text
    Get full text
    Article
  12. 12

    Enhanced hierarchical dynamic bandwidth allocation algorithm with excess bandwidth and SLA techniques for upstream ethernet PON by Sadon S.Kh., Radzi N.A.M., Din N.M., Mustafa I.S., Al-Mansoori M.H., Yaacob M.

    Published 2023
    “…This led to less complicated and more intelligent equipment has been used on the customer's premises. …”
    Conference paper
  13. 13

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Simulated real-time controller for tuning algorithm using modified hill climbing approach by Ahmed, Ahmed Abdulelah

    Published 2014
    “…Often, it is necessary to calibrate a certain parameters of a control system due to plant parameters fluctuation over time.In this research, an intelligent algorithmic tuning technique suitable for realtime system tuning based on hill climbing optimization algorithm and model reference adaptive control system (MRAC) technique is proposed. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20