Search Results - (( intelligence based rsa algorithm ) OR ( intelligence systems stemming algorithm ))
Search alternatives:
- intelligence systems »
- intelligence based »
- stemming algorithm »
- systems stemming »
- rsa algorithm »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
-
3
Bahasa Melayu Stemmer / Subbu Valliappan
Published 2004“…Each of the chapter presents an explanation of the system in a different perspective as to enhance one's understanding of this stemmer.The main idea of this project is to build stemmer that can stem any given words, and to develop a standard stemming algorithm in Malay Language. …”
Get full text
Get full text
Thesis -
4
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
5
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
MODELLING AND CONTROL OF MULTI-FINGERED ROBOT HAND USING INTELLIGENT TECHNIQUES
Published 2014“…In this research, a MFRH with five fingers has been proposed with intelligent control algorithms. Initially, mathematical modeling for the proposed MFRH has been derived to find the Forward Kinematic, Inverse Kinematic, Jacobian, Dynamics and the plant model. …”
Get full text
Get full text
Thesis -
7
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
8
Overhead view based person counting using deep learning
Published 2022“…Detecting people in an image or a video has become more prevalent due to the rapid advancement of technologies in the field of artificial intelligence. In conventional video surveillance systems, most of the person detection methods are based on frontal view, which may have lower accuracy stemming from the occlusion problem. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Enhancing the natural language processing for Malay language stemming, identifying and correcting misspelled words identifying neologism
Published 2015“…The lack of works in building more effective algorithms in performing the stemming process, identifying misspelled words, and identifying neologism has affected the efficiency of retrieving relevant information or articles in Malay language. …”
Get full text
Get full text
Get full text
Thesis -
10
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
11
Design of real time intelligent buses notification system for passengers
Published 2012“…Since most of the modern technologies for the Intelligent Transportation System (ITS) have developed since more than 15 years. …”
Get full text
Get full text
Thesis -
12
EEG based communication system in generalized & customized modes for differently abled communities / Paulraj M. P. ...[et al.]
Published 2013“…The proposed classification system has been validated through simulation.…”
Get full text
Get full text
Get full text
Article
