Search Results - (( intelligence based true algorithm ) OR ( intelligence based rsa algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman by Abd Rohaman, Muhammad Syurahbil

    Published 2020
    “…Even though A* is the most popular algorithm amongst game developers, it's hardly the best algorithm in finding the true shortest path. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization by Saudi, MM, Abuzaid, AM, Taib, BM, Abdullah, ZH

    Published 2024
    “…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
    Proceedings Paper
  7. 7

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…TMS will check the voters’ replies based on the event’s location. The proposed method will delete erroneous readings, while only the true event reports will be reported. …”
    Get full text
    Get full text
    Article
  9. 9

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems by Yasear, Shaymah Akram

    Published 2020
    “…Harris’s hawk multi-objective optimizer (HHMO) algorithm is a MOSIbased algorithm that was developed based on the reference point approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution by Warid, Warid, Hizam, Hashim, Mariun, Norman, Abdul Wahab, Noor Izzri

    Published 2018
    “…An intelligence strategy called quasi-oppositional based learning is incorporated into the proposed algorithm to enhance its convergence property, exploration capability, and solution optimality. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Encryption function on artificial neural network by Al Azawee, H., Husien, S., Yunus, M.A.M.

    Published 2016
    “…The images generated by applying each algorithm were tested for their regularity and residual intelligibility. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20