Search Results - (( intelligence its group algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- intelligence its »
- group algorithm »
- rsa algorithm »
- its group »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
5
-
6
A true annealing approach to the marriage in honey-bees optimization algorithm
Published 2003“…The objective of this paper is to test a conventional annealing approach as the basis for determining the pool of drones. The modified algorithm is tested using a group of randomly generated hard 3-SAT problems to compare its behavior and efficiency against previous implementations. …”
Get full text
Get full text
Get full text
Article -
7
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
8
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
Published 2021“…However, the massive amount of data from threat intelligence feeds for CTI is sketchy and not dependable in terms of quality. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Advances in Particle Swarm Algorithms in Asynchronous, Discrete and Multi-Objective Optimization
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Comparison of mabsa, PSO and GWO of PI-PD controller for dc motor
Published 2024“…To simulate the DC motor system with a PI-PD controller that was optimized by several swarm intelligence algorithms, MATLAB/Simulink software was utilized. …”
Get full text
Get full text
Thesis -
11
Assessing the potential of laboratory instructional tool through Synthesia AI: a case study on student learning outcome / Jacqueline Joseph
Published 2023“…The course was divided into two groups, an experimental group and a control group. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Music Recommender System Using Machine Learning Content-Based Filtering Technique
Published 2022“…These algorithms identify hidden patterns or data groupings without the assistance of a human. …”
Get full text
Get full text
Undergraduates Project Papers -
14
-
15
Methane plume localization with enhanced self-best reduction and Gaussian improved particle swarm optimization (GiPSO)
Published 2024“…Swarm intelligence is a branch of artificial intelligence that studies the collective behavior of groups of social animals such as birds, fish, and bees. …”
Get full text
Get full text
Thesis -
16
Analisis Data Untuk Rekabentuk Sistem Pintar Bagi Pengelas Corak Aliran Minyak-Gas
Published 2006“…The best trained MLP is chosen based on its “intelligence” in classifying unseen data correctly. …”
Get full text
Get full text
Monograph -
17
Social learning and principal-agent problems in profit sharing contract
Published 2023“…We also utilized the latest technique from Artificial Intelligent (AI) system, i.e. a genetic algorithm (GA) to attain an optimal value for PSR and social learning process. � 2016, Emerald Group Publishing Ltd. …”
Article -
18
Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations
Published 2023Conference Paper -
19
Bahasa Melayu Stemmer / Subbu Valliappan
Published 2004“…This Stemmer has a wide variety of applications and it caters for a vast age group. It is expected that when this system is developed and fully utilized, it will benefit its users and customers tremendously withh all of its powerful features. …”
Get full text
Get full text
Thesis -
20
An optimized multi-layer ensemble framework for sentiment analysis
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item
