Search Results - (( intelligence based vi_ algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- vi_ algorithm »
- rsa algorithm »
- based vi_ »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
5
A pond-surface-based Biofloc-farm health-monitoring system for African catfish using deep learning methods
Published 2022“…The research methodology stages are; (i) Acquisition of daily recordings of the surfaces of fish ponds and their respective daily health, (ii)Formulating and developing a fish health monitoring algorithm based on their behaviour from the surface, (iii) Selection of training data based on the recordings and health,(iv) performance metric evaluation, (v) Assessment of experimental results of the Biofloc Fish Health Monitoring System On Pond Surface algorithm, and (vi) final report and project wrap-up. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
7
Adaptable decentralized orchestration engine for block structured non-transactional workflow in service oriented architecture.
Published 2011“…The latter considers the frequent-path adaptability and both of them together satisfy both frequent-path and proportionalfragment adaptability aspects; v) A Fuzzy Decentralization Decision Making algorithm (FDDM) is presented based on the fuzzy logic to choose a suitable method of decentralization that satisfies the three adaptability aspects frequent-path,proportional- fragment and available-bandwidth; and, vi) an algorithm is introduced for wiring of dynamic fragments. …”
Get full text
Get full text
Thesis -
8
Feature Ranking Techniques For 3D ATS Drug Molecular Structure Identification
Published 2018“…Six feature ranking techniques were used: Information Gain (IG), Gain Ratio (GR), Symmetrical Uncertainty (SU), Support vector machine based recursive feature elimination (SVM-RFE), and Variable Importance based random forest (VI-RF). …”
Get full text
Get full text
Get full text
Get full text
Thesis
