Search Results - (( intelligence based true algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- true algorithm »
- rsa algorithm »
- based true »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
3
-
4
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
5
Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman
Published 2020“…Even though A* is the most popular algorithm amongst game developers, it's hardly the best algorithm in finding the true shortest path. …”
Get full text
Get full text
Thesis -
6
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
7
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…TMS will check the voters’ replies based on the event’s location. The proposed method will delete erroneous readings, while only the true event reports will be reported. …”
Get full text
Get full text
Article -
9
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
10
Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems
Published 2020“…Harris’s hawk multi-objective optimizer (HHMO) algorithm is a MOSIbased algorithm that was developed based on the reference point approach. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…An intelligence strategy called quasi-oppositional based learning is incorporated into the proposed algorithm to enhance its convergence property, exploration capability, and solution optimality. …”
Get full text
Get full text
Get full text
Article -
12
Potential of Metal Artifact Reduction (MAR) and Deep Learning-based Reconstruction (DLR) algorithms integration in CT Metal Artifact Correction: a review
Published 2024“…Current DLR implementations like TrueFidelity and Advanced Intelligent Clear-IQ Engine (AiCE) demonstrate promising outcomes. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Encryption function on artificial neural network
Published 2016“…The images generated by applying each algorithm were tested for their regularity and residual intelligibility. …”
Get full text
Get full text
Article -
14
An ensemble method with cost function on churn prediction
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
16
-
17
-
18
-
19
Improvement and application of particle swarm optimization algorithm
Published 2025Get full text
Get full text
Article -
20
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023Get full text
Get full text
Undergraduates Project Papers
