Search Results - (( intelligence p path algorithm ) OR ( intelligence based rsa algorithm ))*
Search alternatives:
- intelligence based »
- intelligence p »
- path algorithm »
- rsa algorithm »
- based rsa »
- p path »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
A novel Bezier curve control point search algorithm for autonomous navigation using N-order polynomial search with boundary conditions
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
Advanced computational geometry for proximity queries of convex polyhedras
Published 2009Get full text
Working Paper -
5
-
6
-
7
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
10
Design And Development Of Collision Avoidance Strategy For Differential Drive Mobile Robot
Published 2018“…In order to evaluate the performance of the proposed methods, a MATLAB Graphical User Interface (GUI) is created to plot the targeted and real path of the robot. In this work, it is shown that both algorithms provide good collision avoidance strategy with a maximum error of only 5cm.…”
Get full text
Get full text
Monograph -
11
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…Also, the volume of P2P traffic is on the rise. P2P and DSD applications function by forming an overlay on top of the existing IP layer (underlay layer). …”
Get full text
Get full text
Thesis -
12
-
13
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
14
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…The Weakest Path (WP), Mean Vulnerabilities on Path (MVoP), and Number of Vulnerabilities (NV) are three metrics introduced in this thesis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Dynamic role engine and formation control for cooperating agents
Published 2009Get full text
Working Paper -
16
-
17
-
18
Modeling and simulation of WSNs for agriculture applications using dynamic transmit power control algorithm
Published 2013Get full text
Working Paper -
19
DNA sequence design for direct-proportional length-based DNA computing: Particle swarm optimization vs population based ant colony optimization
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A novel high performance routing technique for cross-referencing DMFBs
Published 2012Get full text
Working Paper
