Search Results - (( intelligence image based algorithm ) OR ( intelligence based rsa algorithm ))

Refine Results
  1. 1
  2. 2

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  3. 3

    A novel Multi-perspective benchmarking framework for selecting image dehazing intelligent algorithms based on BWM and group VIKOR techniques by Abdulkareem, Karrar Hameed

    Published 2020
    “…A novel Multi-perspective benchmarking framework for selecting image dehazing intelligent algorithms based on BWM and group VIKOR techniques by Abdulkareem, Karrar Hameed …”
    Get full text
    article
  4. 4

    Natural-based underwater image color enhancement through fusion of swarm-intelligence algorithm by Kamil Zakwan, Mohd Azmi, Ahmad Shahrizan, Abdul Ghani, Zulkifli, Md. Yusof, Zuwairie, Ibrahim

    Published 2019
    “…The composition between these histograms improves the image contrast significantly. Next, the swarm-intelligence based mean equalization is proposed to improve the naturalness of the output image. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Vision Based Multi Sensor Feedback System For Robot System With Intelligent by Syed Mohamad Shazali, Syed Abdul Hamid

    Published 2009
    “…This research studies the machine vision system and how it may be integrated to assist a robot system with artificial intelligent (Al). This research focuses on building a vision based feedback system for robotics application that consists of image processor and two vision-based sensor devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    An attack proof intelligent digital watermarking based on safe region of fast fourier transform by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Aburas, A. A.

    Published 2010
    “…We propose a method, an attack proof intelligent system, in which Artificial Neural network is use to locate the Safe Region in the host image and the watermark is embedded based on the located Safe Region in Fast Fourier Transform domain. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12
  13. 13

    Intelligent technique for grading tropical fruit using magnetic resonance imaging by A. Balogun, Wasiu, Salami, Momoh Jimoh Emiyoka, J. McCarthy, Michael, Mohd Mustafah, Yasir, Aibinu, Abiodun Musa

    Published 2013
    “…Levenberg-Marquardt algorithm (trainlm) gave the best performance fitness out of different types of backpropagation algorithm used with least Mean Square Error (MSE) of 0.0814 corresponding to R-value of 0.8094. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Detection Of Misplaced And Missing Regions In Image Using Neural Network by Tan , Jin Siang

    Published 2017
    “…This scenario can be bridged to circuit on the breadboard, which also has similar condition like having several components on the board. Based on research, most of the algorithms are not intelligent enough and only able to detect the missing component. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms by Rachmad, Iqbal, Tri Basuki, Kurniawan, Misinem, ., Edi Surya, Negara, Tata, Sutabri

    Published 2024
    “…This research proposes a low-cost alternative using intelligent fruit selection systems based on computer vision techniques to address these issues. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis