Search Results - (( intelligence v control algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence based »
- intelligence v »
- rsa algorithm »
- v control »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
A Modified Hybrid Fuzzy Controller for Real-Time Mobile Robot Navigation
Published 2023Conference Paper -
4
-
5
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
Coordination of PSS and PID controller for power system stability enhancement - overview
Published 2023“…Research showed the design of controllers based on conventional methods; soft computing and population based algorithms suffer from limitations. …”
Article -
9
-
10
-
11
-
12
PID tuning control strategy using Cuckoo search algorithm for pressure plant
Published 2016Get full text
Conference or Workshop Item -
13
Wind Farm Management using Artificial Intelligent Techniques
Published 2017Get full text
Get full text
Article -
14
-
15
The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed
Published 2024Conference Paper -
16
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
-
20
