Search Results - (( intelligence based vi_ algorithm ) OR ( intelligence system rsa algorithm ))
Search alternatives:
- intelligence system »
- intelligence based »
- vi_ algorithm »
- rsa algorithm »
- system rsa »
- based vi_ »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
6
A pond-surface-based Biofloc-farm health-monitoring system for African catfish using deep learning methods
Published 2022“…The research methodology stages are; (i) Acquisition of daily recordings of the surfaces of fish ponds and their respective daily health, (ii)Formulating and developing a fish health monitoring algorithm based on their behaviour from the surface, (iii) Selection of training data based on the recordings and health,(iv) performance metric evaluation, (v) Assessment of experimental results of the Biofloc Fish Health Monitoring System On Pond Surface algorithm, and (vi) final report and project wrap-up. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
A proposed model for text and image encryption using different techniques
Published 2023“…In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. …”
Article -
8
Adaptable decentralized orchestration engine for block structured non-transactional workflow in service oriented architecture.
Published 2011“…The latter considers the frequent-path adaptability and both of them together satisfy both frequent-path and proportionalfragment adaptability aspects; v) A Fuzzy Decentralization Decision Making algorithm (FDDM) is presented based on the fuzzy logic to choose a suitable method of decentralization that satisfies the three adaptability aspects frequent-path,proportional- fragment and available-bandwidth; and, vi) an algorithm is introduced for wiring of dynamic fragments. …”
Get full text
Get full text
Thesis -
9
Feature Ranking Techniques For 3D ATS Drug Molecular Structure Identification
Published 2018“…Six feature ranking techniques were used: Information Gain (IG), Gain Ratio (GR), Symmetrical Uncertainty (SU), Support vector machine based recursive feature elimination (SVM-RFE), and Variable Importance based random forest (VI-RF). …”
Get full text
Get full text
Get full text
Get full text
Thesis
