Search Results - (( intelligence system rsa algorithm ) OR ( intelligence systems isms algorithm ))
Search alternatives:
- intelligence systems »
- intelligence system »
- isms algorithm »
- rsa algorithm »
- systems isms »
- system rsa »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Improvement on agglomerative hierarchical clustering algorithm based on tree data structure with bidirectional approach
Published 2024Conference Paper -
3
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
4
An exploration technique for the interacted multiple ant colonies optimization framework
Published 2024Conference Paper -
5
Proposal for ontology based approach to fuzzy student model design
Published 2014Get full text
Get full text
Conference or Workshop Item -
6
Feature Selection using Binary Simulated Kalman Filter for Peak Classification of EEG Signals
Published 2018Get full text
Get full text
Conference or Workshop Item -
7
-
8
Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Advances in Particle Swarm Algorithms in Asynchronous, Discrete and Multi-Objective Optimization
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Fault detection with optimum March Test Algorithm
Published 2012Get full text
Conference or Workshop Item -
11
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
12
Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
An exploration technique for the interacted multiple ant colonies optimization framework
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An Analysis on the Number of Agents Towards the Performance of the Simulated Kalman Filter Optimizer
Published 2018Get full text
Get full text
Conference or Workshop Item -
16
Fuzzy Platform for Embedded Wearable EEG Seizure Detection in Ambulatory State
Published 2014Get full text
Get full text
Conference or Workshop Item -
17
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
18
A DNR by Using Rank Evolutionary Particle Swarm Optimization for Power Loss Minimization
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Modeling and simulation of WSNs for agriculture applications using dynamic transmit power control algorithm
Published 2013Get full text
Working Paper -
20
A proposed model for text and image encryption using different techniques
Published 2023“…In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. …”
Article
