Search Results - (( intelligence its graph algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- intelligence its »
- graph algorithm »
- rsa algorithm »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Hybrid bat algorithm for minimum dominating set problem
Published 2017“…In this paper, the stochastic search represented by hybrid swarm intelligence algorithm to find the smallest set of nodes that dominate the graph. …”
Get full text
Get full text
Article -
3
Optimization of Maximum Power Point Tracking (MPPT) of Photovoltaic System using Artificial Intelligence (AI) Algorithms
Published 2013“…Studies on the conventional and intelligent algorithms are conducted and a comparison between their efficiencies and drawbacks is presented. …”
Get full text
Get full text
Final Year Project -
4
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…One such approach is attack graphs. The primary purpose of an attack graph is to not only predict an attack but its next steps within a network as well. …”
Get full text
Get full text
Get full text
Article -
5
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
6
A hybrid local search algorithm for minimum dominating set problems
Published 2022Get full text
Get full text
Article -
7
A hybrid local search algorithm for minimum dominating set problems
Published 2022Get full text
Get full text
Article -
8
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
Published 2012Get full text
Book Section -
11
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
12
A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots
Published 2022“…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
Get full text
Get full text
Get full text
Article -
13
Comparison performances between MABSA-PI controller and MABSA-PD controller for DC motor position system
Published 2023“…The MATLAB controllers are developed using the Simulink toolbox, while the transfer function of a DC motor is obtained from its circuit. Modified adaptive bats sonar algorithm (MABSA) will be implemented in the PI controller and PD controller as the main algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Utilization of Tabu search heuristic rules in sampling-based motion planning
Published 2023“…We also compare the performance of the algorithm with some of the well-known path planning approaches, including Bug1, Bug2, PRM, RRT and the Visibility Graph. …”
Conference Paper -
15
Energy management of battery to DC motor
Published 2008“…By using a L200 component, the charger system should be an intelligent circuit with additional features…”
Get full text
Get full text
Undergraduates Project Papers -
16
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
17
Modification of particle swarm optimization algorithm for optimization of discrete values
Published 2011“…PSO in its original form performs continuous-valued optimization. …”
Get full text
Get full text
Research Reports -
18
Adaptive and optimized radio resource allocation algorithms for OFDMA based networks
Published 2015“…AORAA contains an adaptive and optimized subcarrier allocation algorithm which uses graph theoretic techniques to do the best probable matching of subcarrier and users’ channel information. …”
Get full text
Get full text
Thesis -
19
