Search Results - (( intelligence based rsa algorithm ) OR ( intelligence self sizing algorithm ))
Search alternatives:
- intelligence based »
- intelligence self »
- sizing algorithm »
- rsa algorithm »
- self sizing »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Human upper body pose region estimation
Published 2013Get full text
Get full text
Get full text
Book Chapter -
5
Vision Based Multi Sensor Feedback System For Robot System With Intelligent
Published 2009“…This project also implements colored object recognition technique using its color and size without edge detection process along with a self-calibration technique for detecting object location without any parameter of the camera by using only two reference points. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
7
-
8
Fault detection with optimum March Test Algorithm
Published 2012Get full text
Conference or Workshop Item -
9
Improved Bat Algorithm for faster convergence in solving optimisation problem
Published 2021“…One of the optimisation approaches is metaheuristic. Metaheuristic algorithms are inspired by nature and utilise intelligent mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
11
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Since the emergence of AIS, it has proved itself as an area of computational intelligence. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
A partial feedback reporting scheme for LTE mobile video transmission with QoS provisioning
Published 2017“…Since video flows are considered, a self-optimized partial feedback (SOPF) is further developed by using cross-layer optimization to guarantee QoS. …”
Get full text
Get full text
Article
