Search Results - (( intelligence model protocol algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence model »
- protocol algorithm »
- intelligence based »
- model protocol »
- rsa algorithm »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Cohesive token passing algorithm utilizing software agents
Published 2010“…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
Get full text
Get full text
Article -
3
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
4
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
Article -
5
Geographical and maximum distance on-demand routing algorithm G-MDORA
Published 2024“…Our proposed model provides an idea that can be used to improve the performance of the GRP and MDORA protocol. …”
Article -
6
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
7
Modeling and simulation of WSNs for agriculture applications using dynamic transmit power control algorithm
Published 2013Get full text
Working Paper -
8
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
General purpose search and classification algorithms for distributed information access
Published 2000“…Previous and current research on search engines and information retrieval show that Artificial Intelligence technique is one of the recommended solutions in providing the most relevant, timely and efficient search results for the user.This paper proposed a search engine model that incorporated Artificial Intelligence techniques.…”
Get full text
Get full text
Conference or Workshop Item -
10
Synchronization algorithm for remote heterogeneous database environment
Published 2015Get full text
Get full text
Article -
11
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
12
-
13
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…Next, the ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
text::Thesis -
14
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. …”
Get full text
Get full text
Get full text
Article -
15
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET
Published 2022“…The simulator consists of a network model, a load model, and an attack model. Various speed and transmission ranges and gray hole and wormhole attacks are used in the simulator. …”
Get full text
Get full text
Article -
16
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
Published 2023“…The simulator consists of a network model, a load model, and an attack model. Various speed and transmission ranges and gray hole and wormhole attacks are used in the simulator. …”
Get full text
Get full text
Article -
17
An Energy Efficient Mac Layer Design for Wireless Sensor Network
Published 2008“…The proposed model has been compared to original 802.15.4 standard and the existing Adaptive Backoff Exponent (ABE) MAC protocol to illustrate the improvement. …”
Get full text
Get full text
Thesis -
18
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. …”
Get full text
Get full text
Article -
19
Advances in materials informatics: A review
Published 2024“…Conventional ML models are simple and interpretable, relying on statistical techniques and algorithms to learn patterns and make predictions with limited data. …”
Get full text
Get full text
Get full text
Article -
20
