Search Results - (( intelligence based rsa algorithm ) OR ( intelligence valid md algorithm ))
Search alternatives:
- intelligence based »
- intelligence valid »
- rsa algorithm »
- md algorithm »
- based rsa »
- valid md »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
-
3
Hybrid Intelligent Warning System for Boiler tube Leak Trips
Published 2017Get full text
Get full text
Article -
4
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
5
-
6
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
Discovering decision algorithm from a distance relay event report
Published 2009Get full text
Get full text
Get full text
Article -
9
-
10
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
11
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Conference Paper -
12
-
13
-
14
The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed
Published 2024Conference Paper -
15
-
16
-
17
An adaptive neuro-fuzzy inference system employed cuk converter for PV applications
Published 2023Conference Paper -
18
Adaptive load balancing algorithm for wireless distributed computing networks
Published 2016Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
Eye closure and open detection using Adaptive Thresholding Histogram Enhancement (ATHE) technique and connected components utilisation
Published 2014Get full text
Get full text
Conference or Workshop Item
