Search Results - (( intelligence p based algorithm ) OR ( intelligence based rsa algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Determining optimum carob powder adsorbtion for cleaning wastewater: intelligent optimization with electro-search algorithm by Gezer, B., Kose, U., Zubov, D., Deperlioglu, O., Vasant, P.

    Published 2020
    “…The maximum adsorption value was determined as around 256.44Â mg/g thanks to the Electro-Search Algorithm, a recent Artificial Intelligence based intelligent optimization technique. …”
    Get full text
    Get full text
    Article
  11. 11

    Application of Bee Colony Optimization (BCO) in NP-Hard Problems by Kamarudin, Muhammad Sariy Syazwan

    Published 2011
    “…Bee-Inspired algorithms were presumed to bring the new direction in the field of Swann Intelligence. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20