Search Results - (( intelligence system rsa algorithm ) OR ( intelligence systems stemming algorithm ))
Search alternatives:
- intelligence systems »
- intelligence system »
- stemming algorithm »
- systems stemming »
- rsa algorithm »
- system rsa »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
-
4
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
5
Bahasa Melayu Stemmer / Subbu Valliappan
Published 2004“…Each of the chapter presents an explanation of the system in a different perspective as to enhance one's understanding of this stemmer.The main idea of this project is to build stemmer that can stem any given words, and to develop a standard stemming algorithm in Malay Language. …”
Get full text
Get full text
Thesis -
6
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
8
MODELLING AND CONTROL OF MULTI-FINGERED ROBOT HAND USING INTELLIGENT TECHNIQUES
Published 2014“…In this research, a MFRH with five fingers has been proposed with intelligent control algorithms. Initially, mathematical modeling for the proposed MFRH has been derived to find the Forward Kinematic, Inverse Kinematic, Jacobian, Dynamics and the plant model. …”
Get full text
Get full text
Thesis -
9
Overhead view based person counting using deep learning
Published 2022“…Detecting people in an image or a video has become more prevalent due to the rapid advancement of technologies in the field of artificial intelligence. In conventional video surveillance systems, most of the person detection methods are based on frontal view, which may have lower accuracy stemming from the occlusion problem. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
A proposed model for text and image encryption using different techniques
Published 2023“…In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. …”
Article -
11
Enhancing the natural language processing for Malay language stemming, identifying and correcting misspelled words identifying neologism
Published 2015“…The lack of works in building more effective algorithms in performing the stemming process, identifying misspelled words, and identifying neologism has affected the efficiency of retrieving relevant information or articles in Malay language. …”
Get full text
Get full text
Get full text
Thesis -
12
Design of real time intelligent buses notification system for passengers
Published 2012“…Since most of the modern technologies for the Intelligent Transportation System (ITS) have developed since more than 15 years. …”
Get full text
Get full text
Thesis -
13
EEG based communication system in generalized & customized modes for differently abled communities / Paulraj M. P. ...[et al.]
Published 2013“…The proposed classification system has been validated through simulation.…”
Get full text
Get full text
Get full text
Article
