Search Results - (( intelligence valid drops algorithm ) OR ( intelligence based rsa algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1
  2. 2
  3. 3

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Artificial intelligent power prediction for efficient resource management of WCDMA mobile network by Tee Y.K., Tinng S.K., Koh J., David Y.

    Published 2023
    “…This artificial intelligent call admission control (CAC) was validated using a dynamic WCDMA mobile network simulator. …”
    Conference Paper
  6. 6

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  8. 8

    A real-time integrated fire detection and alarm (FDA) system for network based building automation by Anwar, Farhat, Islam, Rounakul, Hussain, Sabahat, Rashid, Muhammad Mahbubur, Shaikh, Zuhaib

    Published 2017
    “…Objectives: An integrated Fire Detection and Alarm (FDA) systems with building automation was studied, to reduce cost and improve their reliability by preventing false alarm, signal drop and network breakdown. This work proposes an improved framework for FDA system to ensure a robust, intelligent network of FDA control panels in real-time. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Blood cell classification using deep learning by Liaw, Mun Kin

    Published 2022
    “…As a result, the finalized model which consists of batch size of 16, learning rate of 0.0009, global pooling layer, 4 number of classes dropped to 3 number of classes and 3 dense layers achieved a testing accuracy of approximately 63% and validation accuracy of 99%.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines by Tahan, M., Muhammad, M., Abdul Karim, Z.A.

    Published 2017
    “…Two back-propagation training algorithms, namely the Levenberg–Marquardt and Bayesian regularization algorithms, and the k-fold cross-validation technique, were employed to train the optimal networks using a training data set. …”
    Get full text
    Get full text
    Article
  11. 11

    Energy Management Strategies for Optimal Hybrid Microgrid Configuration in the Smart Village Context by Fakhar, Adila

    Published 2018
    “…The hybrid energy management algorithm-based the PLC signal was developed using the MATLAB. …”
    Get full text
    Get full text
    Get full text
    Thesis