Search Results - (( intelligence based rsa algorithm ) OR ( intelligence self sizing algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1
  2. 2
  3. 3

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Vision Based Multi Sensor Feedback System For Robot System With Intelligent by Syed Mohamad Shazali, Syed Abdul Hamid

    Published 2009
    “…This project also implements colored object recognition technique using its color and size without edge detection process along with a self-calibration technique for detecting object location without any parameter of the camera by using only two reference points. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Improved Bat Algorithm for faster convergence in solving optimisation problem by Ramli, Mohamad Raziff

    Published 2021
    “…One of the optimisation approaches is metaheuristic. Metaheuristic algorithms are inspired by nature and utilise intelligent mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  11. 11

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…Since the emergence of AIS, it has proved itself as an area of computational intelligence. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    A partial feedback reporting scheme for LTE mobile video transmission with QoS provisioning by Salman, Mustafa Ismael, Abdulhasan, Muntadher Qasim, Ng, Chee Kyun, Noordin, Nor Kamariah, Mohd Ali, Borhanuddin, Sali, Aduwati

    Published 2017
    “…Since video flows are considered, a self-optimized partial feedback (SOPF) is further developed by using cross-layer optimization to guarantee QoS. …”
    Get full text
    Get full text
    Article