Search Results - (( intelligence system rsa algorithm ) OR ( intelligence its graph algorithm ))
Search alternatives:
- intelligence system »
- intelligence its »
- graph algorithm »
- rsa algorithm »
- system rsa »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
Hybrid bat algorithm for minimum dominating set problem
Published 2017“…In this paper, the stochastic search represented by hybrid swarm intelligence algorithm to find the smallest set of nodes that dominate the graph. …”
Get full text
Get full text
Article -
4
Optimization of Maximum Power Point Tracking (MPPT) of Photovoltaic System using Artificial Intelligence (AI) Algorithms
Published 2013“…Studies on the conventional and intelligent algorithms are conducted and a comparison between their efficiencies and drawbacks is presented. …”
Get full text
Get full text
Final Year Project -
5
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
6
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…One such approach is attack graphs. The primary purpose of an attack graph is to not only predict an attack but its next steps within a network as well. …”
Get full text
Get full text
Get full text
Article -
7
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A hybrid local search algorithm for minimum dominating set problems
Published 2022Get full text
Get full text
Article -
9
A hybrid local search algorithm for minimum dominating set problems
Published 2022Get full text
Get full text
Article -
10
-
11
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
12
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
Published 2012Get full text
Book Section -
13
A comprehensive overview of classical and modern route planning algorithms for self-driving mobile robots
Published 2022“…Classical or traditional methods, such as Roadmaps (Visibility Graph and Voronoi Diagram), Potential Fields, and Cell Decomposition, and modern methodologies such as heuristic-based (Dijkstra Method, A* Algorithms, and D* Algorithms), metaheuristics algorithms (such as PSO, Bat Algorithm, ACO, and Genetic Algorithm), and neural systems such as fuzzy neural networks or fuzzy logic (FL) and Artificial Neural Networks (ANN) are described in this report. …”
Get full text
Get full text
Get full text
Article -
14
Comparison performances between MABSA-PI controller and MABSA-PD controller for DC motor position system
Published 2023“…The MATLAB controllers are developed using the Simulink toolbox, while the transfer function of a DC motor is obtained from its circuit. Modified adaptive bats sonar algorithm (MABSA) will be implemented in the PI controller and PD controller as the main algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Utilization of Tabu search heuristic rules in sampling-based motion planning
Published 2023“…We also compare the performance of the algorithm with some of the well-known path planning approaches, including Bug1, Bug2, PRM, RRT and the Visibility Graph. …”
Conference Paper -
16
A proposed model for text and image encryption using different techniques
Published 2023“…In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. …”
Article -
17
Energy management of battery to DC motor
Published 2008“…By using a L200 component, the charger system should be an intelligent circuit with additional features…”
Get full text
Get full text
Undergraduates Project Papers -
18
Modification of particle swarm optimization algorithm for optimization of discrete values
Published 2011“…PSO in its original form performs continuous-valued optimization. …”
Get full text
Get full text
Research Reports -
19
Adaptive and optimized radio resource allocation algorithms for OFDMA based networks
Published 2015“…AORAA contains an adaptive and optimized subcarrier allocation algorithm which uses graph theoretic techniques to do the best probable matching of subcarrier and users’ channel information. …”
Get full text
Get full text
Thesis -
20
