Search Results - (( intelligence based rsa algorithm ) OR ( intelligence system his algorithm ))
Search alternatives:
- intelligence system »
- intelligence based »
- rsa algorithm »
- his algorithm »
- system his »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
Get full text
Get full text
Get full text
Citation Index Journal -
3
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
-
5
-
6
Assignation of PSM evaluator using genetic algorithm
Published 2012“…The purpose of this paper is to present a design of development for Assignation of PSM Evaluator using Genetic Algorithm(APEGA)system.This is an application system that is used to assist the Faculty of Computer System and Software Engineering(FSKKP)of University Malaysia Pahang(UMP)in matching the optimum evaluators for the students in PSM presentation carnival.In the methodology part,a development model which involves with client participation is designed in order to use in the development of this project.The target user of the system is PSM coordinator who is responsible in assigning the PSM evaluator.Assignation of PSM Evaluator using Genetic Algorithm APEGA)is expected to be able in developing a well-distributed matching and overcoming the relevant constraints in an intelligent way. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
ARTIFICIAL IMMUNE ALGORITHM BASED GRAVIMETRIC FLUID DISPENSING MACHINE
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A hybrid-based modified adaptive fuzzy inference engine for pattern classification
Published 2011Get full text
Get full text
Conference or Workshop Item -
10
Proposal for ontology based approach to fuzzy student model design
Published 2014“…Intelligent tutoring system (ITS) is a software system designed using artificial intelligent techniques (comprising of Fuzzy Logic, Neural-Networks, Bayesian networks, Ontology, Genetic Algorithms and Software Agents) to provide an adaptive and personalized tutoring suitable to each individual student based on his/her profile or characteristics. …”
Get full text
Get full text
Conference or Workshop Item -
11
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
12
-
13
Artificial immune algorithm based gravimetric fluid dispensing machine
Published 2023Conference Paper -
14
Neural network in handwritten recognition system: A survey
Published 2003“…This paper presents a survey on the application of neural networks in handwritten recognition system. Several methodologies including feature extractions, neural network models and algorithms are highlighted.…”
Get full text
Get full text
Conference or Workshop Item -
15
Artificial Immune Algorithm Based Gravimetric Fluid Dispensing Machine
Published 2011Get full text
Get full text
Conference or Workshop Item -
16
Ontology based approach to Fuzzy student model design
Published 2014“…An important component of these elearning systems in use today is called the intelligent tutoring system (ITS). …”
Get full text
Get full text
Article -
17
-
18
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
19
Improving Ant Swarm Optimization With Embedded Vaccination For Optimum Reducts Generation
Published 2011Get full text
Get full text
Conference or Workshop Item -
20
