Search Results - (( intelligence based rsa algorithm ) OR ( intelligence making drops algorithm ))
Search alternatives:
- intelligence making »
- intelligence based »
- rsa algorithm »
- making drops »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems
Published 2024“…(ii) The global search and fast convergence ability of the intelligent water drops algorithm make it efficient to the problem (Noferesti and Shah-Hosseini, 2012). …”
thesis::doctoral thesis -
3
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
Hybrid artificial intelligent algorithm for call admission control in WCDMA mobile network
Published 2023Conference paper -
5
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
7
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
8
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
9
Real-Time Implementation Of LPC-10 Codec On TMS320C6713 DSP
Published 2012“…This assumption produced a non-natural speech signal but with high intelligible level. One more reason is that the frame could have voiced plus unvoiced parts within the same frame, and by classifying this frame as voiced or unvoiced due to rigid decision would drop the level of quality significantly. …”
Get full text
Get full text
Get full text
Get full text
Thesis
