Search Results - (( intelligence system rsa algorithm ) OR ( intelligent system growth algorithm ))
Search alternatives:
- intelligence system »
- growth algorithm »
- rsa algorithm »
- system rsa »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
Article -
6
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…The growth of intelligent intrusion and diverse attack techniques in network systems stimulate computer scientists and mathematical researchers to challenge the dangers of intelligent attacks. …”
Get full text
Get full text
Get full text
Citation Index Journal -
7
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
8
An Empirical Evaluation of Artificial Intelligence Algorithm for Hand Posture Classification
Published 2022“…Besides, the biometric inputs like Human Face, Voice, Physical actions, EEG signals, etc. are cascaded with the computing module for robust and intelligent decision making. The hand postures are one of the most common biometric for system automation & feedback. …”
Get full text
Get full text
Article -
9
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
Get full text
Get full text
Get full text
Article -
10
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
11
A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali
Published 2015“…Swarm intelligence is a modern artificial intelligence discipline that is concerned with the design and optimization of multiagent systems with applications in robotics. …”
Get full text
Get full text
Thesis -
12
A proposed model for text and image encryption using different techniques
Published 2023“…In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. …”
Article -
13
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
14
Clustering autism spectrum disorder student’s system based on intelligence, skills and behavior using agglomerative clustering algortihm / Daarin Nadia Nordin
Published 2020“…Thus, this project proposes a solution to the problems by utilizing the machine learning approach which is the Agglomerative clustering algorithm. Previous studies shows that homogenous grouping of autistics students yields positive results, therefore, this project proposes to design and develop a clustering model system known as the CASDSS (Clustering Autism Spectrum Disorder Students System) where the main goal of this system is to create a homogenous grouping of the ASD students based on their behaviour, skills and intelligence. …”
Get full text
Get full text
Thesis -
15
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…Feature selection represents an important preprocessing step in many intelligent and expert systems such as intrusion detection, disease prediction, and sentiment analysis. …”
Get full text
Get full text
Article -
16
-
17
IoT Based Smart Greenhouse Monitoring System With Fuzzy Logic
Published 2023“…Additionally, the system incorporates an intelligent lighting system to optimize light intensity. …”
Get full text
Get full text
Undergraduates Project Papers -
18
-
19
Transient security assessment for power system stability: a review on artificial intelligence approach
Published 2009“…This paper attempts to overview several available techniques for assessing the Transient Security Assessment (TSA) of a power system. Different algorithms are explained in details (Static and Dynamic Security Assessment) with the uses of Artificial Intelligent (AI) method. …”
Get full text
Get full text
Conference or Workshop Item -
20
ELP-M2: An Efficient Model for Mining Least Patterns from Data Repository
Published 2017Get full text
Get full text
Get full text
Get full text
Book Chapter
