Search Results - (( intelligence system rsa algorithm ) OR ( intelligence _ group algorithm ))
Search alternatives:
- intelligence system »
- group algorithm »
- rsa algorithm »
- system rsa »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm
Published 2017“…This work is aimed to decrease the total real and reactive power losses while enhancing the voltage profile of the distribution network with less computation time by proposing two new artificial intelligence algorithms, i.e. grouping particle swarm optimization algorithm and grouping genetic algorithm. …”
Get full text
Get full text
Thesis -
6
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
7
A novel Multi-perspective benchmarking framework for selecting image dehazing intelligent algorithms based on BWM and group VIKOR techniques
Published 2020“…A novel Multi-perspective benchmarking framework for selecting image dehazing intelligent algorithms based on BWM and group VIKOR techniques by Abdulkareem, Karrar Hameed …”
Get full text
article -
8
A proposed model for text and image encryption using different techniques
Published 2023“…In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. …”
Article -
9
A hybrid intelligent active force controller for robot arms using evolutionary neural networks
Published 2000“…The population is divided into different groups according to their fitness. The elitist group will not undergo any operation, while the second group, i.e. stronger group, undergoes the EP operation. …”
Get full text
Get full text
Article -
10
Hybrid intelligent active force controller for robot arms using evolutionary neural networks
Published 2000“…The population is divided into different groups according to their fitness. The elitist group will not undergo any operation, while the second group, i.e. stronger group, undergoes the EP operation. …”
Get full text
Get full text
Article -
11
Artificial Intelligence Matching Algorithm with UTP Final Year Project Students and Advisors Matching as Test Case
Published 2022Get full text
Get full text
Final Year Project -
12
Optimizing the Management of Knowledge Assets using Swarm Intelligence
Published 2018“…This study presents the employment of swarm intelligence algorithm, i.e Firefly Algorithm, to automatically cluster text document without the use of k value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
-
15
-
16
Improvement on agglomerative hierarchical clustering algorithm based on tree data structure with bidirectional approach
Published 2024Conference Paper -
17
-
18
Optimised intelligent tilt controller scheme using genetic algorithms
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A true annealing approach to the marriage in honey-bees optimization algorithm
Published 2003“…The objective of this paper is to test a conventional annealing approach as the basis for determining the pool of drones. The modified algorithm is tested using a group of randomly generated hard 3-SAT problems to compare its behavior and efficiency against previous implementations. …”
Get full text
Get full text
Get full text
Article -
20
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
Published 2021“…However, the massive amount of data from threat intelligence feeds for CTI is sketchy and not dependable in terms of quality. …”
Get full text
Get full text
Get full text
Get full text
Thesis
