Search Results - (( intelligence valid access algorithm ) OR ( intelligence system rsa algorithm ))
Search alternatives:
- intelligence system »
- intelligence valid »
- access algorithm »
- rsa algorithm »
- valid access »
- system rsa »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
-
4
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
5
Cohesive token passing algorithm utilizing software agents
Published 2010“…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
Get full text
Get full text
Article -
6
Artificial intelligent power prediction for efficient resource management of WCDMA mobile network
Published 2023“…This artificial intelligent call admission control (CAC) was validated using a dynamic WCDMA mobile network simulator. …”
Conference Paper -
7
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Enhanced hierarchical dynamic bandwidth allocation algorithm with excess bandwidth and SLA techniques for upstream ethernet PON
Published 2023“…We show the results of simulations to validate the effectiveness of algorithms presented and to provide quality of service (QoS) for triple play real time services in Ethernet passive optical networks (EPONs). � 2009 IEEE.…”
Conference paper -
9
-
10
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
11
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…From the pseudocode of the proposed algorithm, it is observed that the complexity of the algorithm is O(n) which is linear, hence the response time is considered good. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Adaptable algorithms for performance optimization of dynamic batch manufacturing processes
Published 2018“…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
A proposed model for text and image encryption using different techniques
Published 2023“…In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. …”
Article -
16
-
17
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
A Novel Model on Curve Fitting and Particle Swarm Optimization for Vertical Handover in Heterogeneous Wireless Networks
Published 2015“…In addition, we present a novel network selection algorithm to select the best candidate access point among the various access technologies based on the PSO. …”
Get full text
Get full text
Get full text
Article -
19
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
Get full text
Get full text
Get full text
Article -
20
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…The research leverages Artificial Intelligence (AI)-based Genetic Algorithms (GA) and game theory to address critical challenges in resource allocation. …”
Get full text
Get full text
Get full text
Thesis
