Search Results - (( intelligence self based algorithm ) OR ( intelligence based rsa algorithm ))*
Search alternatives:
- intelligence based »
- intelligence self »
- rsa algorithm »
- self based »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Integration of dual intelligent algorithms in shunt active power filter
Published 2013“…This paper presents an integration of dual intelligent algorithms: artificial neural network (ANN) based fundamental component extraction algorithm and fuzzy logic based DC-link voltage self-charging algorithm (fuzzy self-charging algorithm), in a three-phase three-wire shunt active power filter (SAPF). …”
Get full text
Get full text
Conference or Workshop Item -
3
Advancements and challenges in mobile robot navigation: a comprehensive review of algorithms and potential for self-learning approaches
Published 2024“…With the goal of enhancing the autonomy in mobile robot navigation, numerous algorithms (traditional AI-based, swarm intelligence-based, self-learning-based) have been built and implemented independently, and also in blended manners. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
Get full text
Get full text
Get full text
Article -
5
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
Get full text
Get full text
Article -
6
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
7
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
Get full text
Get full text
Thesis -
8
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Self-driving car with Artificial Intelligence (AI) technology / Asrul Amin Mohd Isa ... [et al.]
Published 2023“…The autonomous vehicle technology is highly developed and ready for commercial deployment. The self-driving car is a type of autonomous vehicle that can drive autonomously based on Artificial Intelligence (AI). …”
Get full text
Get full text
Get full text
Article -
10
Vision Based Multi Sensor Feedback System For Robot System With Intelligent
Published 2009“…The feedback system also feeds the Artificial Intelligent program necessary information to make the right decision, which is based on rules of a popular game, Tic-Tac-Toe. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Methane plume localization with enhanced self-best reduction and Gaussian improved particle swarm optimization (GiPSO)
Published 2024“…Secondly, our research questions how the Gaussian gas plume model can address the adaptation of swarm intelligence in drone-based gas leakage detection. To address swarm intelligence adaptation in drone-based gas leakage detection, we investigate the existing swarm intelligence capability in optimizing dynamical problems in gas plume detection. …”
Get full text
Get full text
Thesis -
12
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
13
Lithium-ion Battery State of Charge Estimation Method Using Optimized Deep Recurrent Neural Network Algorithm
Published 2023Conference Paper -
14
Sustainable Management Of River Water Quality Using Artificial Intelligence Optimisation Algorithms
Published 2021“…This study is aimed at proposing a superior artificial intelligence optimisation algorithm for sustainable river water quality management. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
QoS based fair load-balancing: paradigm to IANRA routing algorithm for wireless networks (WNs)
Published 2008“…In this paper, a new algorithm, Intelligent agent AntNet based Routing Algorithm (IANRA) is proposed to enhance load balancing strategy in Wireless Networks (WNs). …”
Get full text
Get full text
Conference or Workshop Item -
16
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…According to [13], the two best-known swarm intelligence algorithms are Particle Swarm Optimisation (PSO) and Ant Colony Optimisation (ACO). …”
Get full text
Get full text
Monograph -
17
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…Developing an intelligent wearable robotic hand glove system based on PSCA with self-calibration feature of grasping mechanism is implemented. …”
Get full text
Get full text
Thesis -
18
A Survey of Stochastic processes in Wireless Sensor Network: a Power Management Prospective
Published 2013“…This survey is focusing on the stochastic process based power management algorithms for the WSN field. …”
Get full text
Get full text
Conference or Workshop Item -
19
Human upper body pose region estimation
Published 2013Get full text
Get full text
Get full text
Book Chapter -
20
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article
