Search Results - (( intelligence system growth algorithm ) OR ( intelligence based rsa algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
    Article
  5. 5

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…The growth of intelligent intrusion and diverse attack techniques in network systems stimulate computer scientists and mathematical researchers to challenge the dangers of intelligent attacks. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  6. 6

    An Empirical Evaluation of Artificial Intelligence Algorithm for Hand Posture Classification by Hussain, A., Hussain, S.S., Uddin, M.M., Zubair, M., Kumar, P., Umair, M.

    Published 2022
    “…Besides, the biometric inputs like Human Face, Voice, Physical actions, EEG signals, etc. are cascaded with the computing module for robust and intelligent decision making. The hand postures are one of the most common biometric for system automation & feedback. …”
    Get full text
    Get full text
    Article
  7. 7

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali by Mohamed Kamali, Mohd Zahurin

    Published 2015
    “…Swarm intelligence is a modern artificial intelligence discipline that is concerned with the design and optimization of multiagent systems with applications in robotics. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  12. 12

    Clustering autism spectrum disorder student’s system based on intelligence, skills and behavior using agglomerative clustering algortihm / Daarin Nadia Nordin by Nordin, Daarin Nadia

    Published 2020
    “…Thus, this project proposes a solution to the problems by utilizing the machine learning approach which is the Agglomerative clustering algorithm. Previous studies shows that homogenous grouping of autistics students yields positive results, therefore, this project proposes to design and develop a clustering model system known as the CASDSS (Clustering Autism Spectrum Disorder Students System) where the main goal of this system is to create a homogenous grouping of the ASD students based on their behaviour, skills and intelligence. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection by Tubishat, Mohammad, Idris, Norisma, Shuib, Liyana, Abushariah, Mohammad A.M., Mirjalili, Seyedali

    Published 2020
    “…Feature selection represents an important preprocessing step in many intelligent and expert systems such as intrusion detection, disease prediction, and sentiment analysis. …”
    Get full text
    Get full text
    Article
  14. 14

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  15. 15
  16. 16

    IoT Based Smart Greenhouse Monitoring System With Fuzzy Logic by Nur Ainin Sofiya, Abu Kasim

    Published 2023
    “…Additionally, the system incorporates an intelligent lighting system to optimize light intensity. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17
  18. 18

    Transient security assessment for power system stability: a review on artificial intelligence approach by Al-Masri, Ahmed Naufal A., Ab Kadir, Mohd Zainal Abidin, Hizam, Hashim, Jasni, Jasronita, Mariun, Norman

    Published 2009
    “…This paper attempts to overview several available techniques for assessing the Transient Security Assessment (TSA) of a power system. Different algorithms are explained in details (Static and Dynamic Security Assessment) with the uses of Artificial Intelligent (AI) method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Malaysian license plate number detection based on sobel vertical edge algorithm / Siti Nor Azimah Ibrahim by Ibrahim, Siti Nor Azimah

    Published 2007
    “…A License Plate Recognition (LPR) System is one kind of Intelligent Transport systems and is of considerable interest because of its potential applications to areas such as highway electronic toll collection, Traffic Monitoring System and so on. …”
    Get full text
    Get full text
    Thesis