Search Results - (( intelligence system berhad algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence system »
- intelligence based »
- berhad algorithm »
- rsa algorithm »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Intelligent Optimization Systems for MaintenanceScheduling of Power Plant Generators
Published 2024“…The Analytical Hierarchy Process (AHP), a decision-making tool, is implemented to aid the researcher in prioritizing and re-ranking the maintenance activities from the most important to the least. The intelligent optimization models are developed using MATLAB and the developed intelligent algorithms are tested on a case study in a coal power plant located at minjung, Perak, Malaysia. …”
Article -
5
Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State
Published 2022“…Furthermore, a hybrid Spatial-Artificial Intelligence (AI) algorithm is proposed to integrate RES sites with minimum total distance and minimum total elevation difference. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
7
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
8
Utilization of Artificial Neural Networks to Improve the Accuracy of a Hybrid Power System Model
Published 2019“…Due to the high operating cost of GTG system compared even with the grid supply in Malaysia, Tenaga Nasional Berhad (TNB). …”
Get full text
Get full text
Conference or Workshop Item -
9
Utilization of Artificial Neural Networks to Improve the Accuracy of a Hybrid Power System Model
Published 2019“…Due to the high operating cost of GTG system compared even with the grid supply in Malaysia, Tenaga Nasional Berhad (TNB). …”
Get full text
Get full text
Conference or Workshop Item
