Search Results - (( intelligence based rsa algorithm ) OR ( intelligence systematic mining algorithm ))
Search alternatives:
- intelligence systematic »
- intelligence based »
- systematic mining »
- mining algorithm »
- rsa algorithm »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Y-type Random 2-satisfiability In Discrete Hopfield Neural Network
Published 2024“…In the current development of Artificial Intelligence, Satisfiability plays a crucial role as a symbolic language of Artificial Intelligence for the transparency of black box models. …”
Get full text
Get full text
Thesis -
3
A systematic literature review on the impact of data mining on workforce privacy and employment practices: ethical concerns and risks
Published 2025“…Data mining tools enabled by artificial intelligence can change the norms in employment practices. …”
Get full text
Get full text
Get full text
Article -
4
-
5
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
6
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
Get full text
Get full text
Get full text
Article -
7
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
11
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article
