Search Results - (( intelligence theory based algorithm ) OR ( intelligence based rsa algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Power system stabilization based on artificial intelligent techniques: a review by Hassan, L.H., Moghavvemi, M., Mohamed, H.A.F.

    Published 2009
    “…These techniques are Artificial Neural Network (ANN), fuzzy logic, hybrid artificial intelligent, expert systems, and optimization techniques base AI such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Tabu Search (TS) algorithm, etc. …”
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Research on the construction of English intelligent classroom based on Artificial Intelligence by Wu, Yong, Othman, Abdul Jalil, Saad, Mohd Rashid Mohd

    Published 2018
    “…Aiming at prompting efficiency and effectiveness of English teaching, establishment of integrated English teaching intelligent classroom based on artificial intelligence is discussed in this paper. …”
    Get full text
    Get full text
    Article
  8. 8

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…Thus, this thesis addresses these issues with the objective of intelligently divulging the knowledge hidden in the recorded event report at a relay device level using a data mining strategy based on Rough Set Theory, Genetic Algorithm and Rule Quality Measure under supervised learning within the framework of Knowledge Discovery in Database (KDD) in order to discover the relay’s decision algorithm (prediction rules) and, subsequently, the association rule. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  15. 15

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  16. 16

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
    Get full text
    Get full text
    Research Reports
  17. 17
  18. 18
  19. 19

    Efficient transmission based on genetic evolutionary algorithm by Jin Fan, Kit Guan Lim, Helen Sin Ee Chuo, Min Keng Tan, Ali Farzamnia, Kenneth Tze Kin Teo

    Published 2022
    “…In this paper, an energy-saving mechanism based on genetic algorithm in wireless sensor network (WSN) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  20. 20

    Identifying football conflict using soft-set theory in Indonesia super league / Kukuh Wahyudin Pratama by Kukuh Wahyudin , Pratama

    Published 2021
    “…The novelty of the proposed approach is discussed in rough set theory that include decision rules. It is based on the concept of co-occurrence of parameters in soft set theory. …”
    Get full text
    Get full text
    Thesis