Search Results - (( intelligence system _cross algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence system »
- intelligence based »
- _cross algorithm »
- system _cross »
- rsa algorithm »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
A new Doppler Spread Estimation Algorithm Based on Zero Crossings of The Auto-correlation
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Industry 5.0 and Education 5.0: Transforming Vocational Education through Intelligent Technology
Published 2024“…By analyzing the research gaps in personalized learning paths, emotion-driven learning, crossdisciplinary integration, and long-term learning behavior analysis, the paper proposes four improved algorithms: the adaptive learning path generation algorithm, the emotion-driven personalized learning algorithm, the cross-disciplinary knowledge graph algorithm, and the long-term learning behavior prediction algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
7
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
8
-
9
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
10
Prediction of photovoltaic system output using hybrid Cuckoo Search Least Square Support Vector Machine / Muhammad Aidil Adha Aziz
Published 2019“…The results showed that CS-LSSVM provides better performance in predicting photovoltaic system power output as compared to conventional LS-SVM using cross-validation technique.…”
Get full text
Get full text
Thesis -
11
Inverse kinematic solution in handling 3R manipulator via real-time genetic algorithm
Published 2023Conference paper -
12
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…Since KNN is the simplest form of artificial intelligence, future work could combine this algorithm with other classification algorithm. …”
Get full text
Get full text
Thesis -
13
Implementation of Evolutionary Algorithms to Parametric Identification of Gradient Flexible Plate Structure
Published 2023“…This paper focused on modelling of a gradient flexible plate system utilizing an evolutionary algorithm, namely particle swarm optimization (PSO) and cuckoo search (CS) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Implementation of Evolutionary Algorithms to Parametric Identification of Gradient Flexible Plate Structure
Published 2023“…This paper focused on modelling of a gradient flexible plate system utilizing an evolutionary algorithm, namely particle swarm optimization (PSO) and cuckoo search (CS) algorithm. …”
Get full text
Get full text
Get full text
Article -
15
-
16
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
17
Spiral-sooty tern optimization algorithm for dynamic modelling of a twin rotor system
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Tracking using normalized cross correlation and color space
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Intelligent control of grain drying process using fuzzy logic controller.
Published 2010“…Applying an intelligent controller such as fuzzy logic controller to a grain drying system is a good choice as fuzzy logic controller is a very powerful control methodology that can estimate functions based on partial knowledge of the system in case of parameter uncertainties and can deal with non-linear behaviour. …”
Get full text
Get full text
Article -
20
