Search Results - (( intelligence based rsa algorithm ) OR ( intelligence valid research algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques by Salem S. M. Khalifa

    Published 2024
    “…The architecture proposed in this research provides the opportunity for combining intelligent computing techniques in a comprehensive architecture. …”
    thesis::doctoral thesis
  4. 4

    Bats echolocation-inspired algorithms for global optimisation problems by Nafrizuan, Mat Yahya

    Published 2016
    “…The aim of the research is to introduce novel form of swarm intelligence algorithms based on real echolocation behaviour of bats. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  8. 8

    Vision Based Multi Sensor Feedback System For Robot System With Intelligent by Syed Mohamad Shazali, Syed Abdul Hamid

    Published 2009
    “…Finally, a set of experiments to validate the proposed algorithms has been conducted. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Intelligent classification algorithms in enhancing the performance of support vector machine by Alwan, Hiba Basim, Ku-Mahamud, Ku Ruhana

    Published 2019
    “…Eight benchmark datasets from UCI were used in the experiments to validate the performance of the proposed algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…The simulation algorithm and interactive environment thus developed and validated form suitable test and verification platforms for the development of AVC strategies for flexible structures as well as for learning and research purposes.…”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    An Intelligent Process Model for Manufacturing System Optimization by Ho , Kok Hoe, Kanesan , Muthusamy, Harikrishnan , Kanthen

    Published 2012
    “…Manual analysis from human can be transposed to mathematical language in order automate the system intelligently. The building of intelligent modeling system into spreadsheet using mathematical language sets a new platform for researchers to promote the next generation of modeling technique in the manufacturing field. …”
    Get full text
    Article
  15. 15

    Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State by Far Chen, Jong

    Published 2022
    “…The minimum total distances in all four cases are acquired and validated as both the TSP-GA algorithm and the Traveling Salesman Problem-Mixed Integer Linear Programming (TSP-MILP) algorithm produced the same routing pattern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms by Rachmad, Iqbal, Tri Basuki, Kurniawan, Misinem, ., Edi Surya, Negara, Tata, Sutabri

    Published 2024
    “…The feature extraction methods evaluated were Grayscale Pixel Values, Mean Pixel Value of Channels, and Extracting Edge Features. The classification algorithm used in this research is the Convolutional Neural Network (CNN) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  18. 18

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
    Conference Paper
  19. 19

    The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Ahmad A., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…Due to network complexity, conventional QoS-improving routing algorithms (RAs) may be impractical. Thus, researchers are developing intelligent RAs, including machine learning (ML)-based algorithms to meet traffic Q oS r equirements. …”
    Conference Paper
  20. 20