Search Results - (( intelligence valid sizing algorithm ) OR ( intelligence based rsa algorithm ))
Search alternatives:
- intelligence valid »
- intelligence based »
- sizing algorithm »
- rsa algorithm »
- based rsa »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Intelligent classification algorithms in enhancing the performance of support vector machine
Published 2019“…Eight benchmark datasets from UCI were used in the experiments to validate the performance of the proposed algorithms. …”
Get full text
Get full text
Get full text
Article -
3
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Vision Based Multi Sensor Feedback System For Robot System With Intelligent
Published 2009“…Finally, a set of experiments to validate the proposed algorithms has been conducted. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…However due to its limited size and cost of cache comparable to other storage devices, cache replacement algorithm is used to determine and evict page when the cache is full to create space for new pages. …”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
10
An application of image processing for automated mixed household waste sorting system
Published 2012Get full text
Working Paper -
11
-
12
-
13
A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks
Published 2012Get full text
Get full text
Conference or Workshop Item -
14
Processing time estimation in precision machining industry using AI / Lim Say Li
Published 2017“…Neural Network (NN) model is chosen as the artificial intelligence approach used in this research. Levenberg-Marquardt algorithm is used as the training algorithm. …”
Get full text
Get full text
Thesis -
15
Optimal location and sizing of SVC using Particle Swarm Optimization technique
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…In addition, ISSA was compared with four well-known optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization, Grasshopper Optimization Algorithm, and Ant Lion Optimizer. …”
Get full text
Get full text
Article -
18
A Novel Adaptive Spiral Dynamic Algorithm for Global Optimization
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
20
Improved Bat Algorithm for faster convergence in solving optimisation problem
Published 2021“…Therefore, this confirms the validity of the IBA as an alternative algorithm for solving optimisation problems.…”
Get full text
Get full text
Get full text
Get full text
Thesis
