Search Results - intelligence _ ((((data algorithm) OR (acs algorithm))) OR (rsa algorithm))
Search alternatives:
- data algorithm »
- acs algorithm »
- rsa algorithm »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
Published 2019“…In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amount of energy, especially during the training phase. …”
Get full text
Get full text
Article -
3
Attitude Control System for InnoSAT
Published 2009“…To develop attitude control algorithms software; ACS is the part of the ADCS payload. …”
Get full text
Other -
4
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
5
Improved Dynamic Ant Colony System (DACS) on Symmetric Traveling Salesman Problem (TSP).
Published 2007Get full text
Get full text
Conference or Workshop Item -
6
-
7
-
8
Analysis of Delay Performance on the Intelligent Fuzzy Logic Dynamic Bandwidth Allocation Algorithm
Published 2023“…In this paper, we study the delay performance of an intelligent fuzzy logic based dynamic bandwidth allocation (IFLDBA) algorithm for EPON. …”
Article -
9
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
10
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The simulation results show the AMS algorithm significantly improves the performance over RSA-MSDU and the standard for real-time traffic in terms of reducing average delay and packet loss up to 56% and 24% respectively. …”
Get full text
Get full text
Thesis -
11
Development of hybrid artificial intelligent based handover decision algorithm
Published 2017“…Hence, in this paper, the development of novel hybrid artificial intelligent handover decision algorithm has been developed. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…This merit is provided by balancing the exploitation of solution structure and exploration of its appropriate weighting factors through use of a robust and efficient optimization algorithm in learning process of GEP approach. To assess the applicability and accuracy of the proposed method for long-term electrical energy consumption, its estimates are compared with those obtained from artificial neural network (ANN), support vector regression (SVR), adaptive neuro-fuzzy inference system (ANFIS), rule-based data mining algorithm, GEP, linear, quadratic and exponential models optimized by particle swarm optimization (PSO), cuckoo search algorithm (CSA), artificial cooperative search (ACS) algorithm and backtracking search algorithm (BSA). …”
Get full text
Get full text
Get full text
Thesis -
14
Intelligent decision support systems for oil price forecasting
Published 2015“…This research studies the application of hybrid algorithms for predicting the prices of crude oil. Brent crude oil price data and hybrid intelligent algorithm (time delay neural network, probabilistic neural network, and fuzzy logic) were used to build intelligent decision support systems for predicting crude oil prices. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
16
Linking Bayesian Network and Intensive Care Units Data: A Glycemic Control Study
Published 2023Conference Paper -
17
-
18
-
19
Ulcer detection and classification of wireless capsule endoscopy images using RGB masking
Published 2016“…Therefore, it would be extremely advantageous to develop an intelligent algorithm to inspect the WCE images. This research aims to develop an algorithm to enhance wireless capsule endoscopy images and analyses them to detect Ulcer located in small intestine. …”
Get full text
Get full text
Article -
20
Ulcer detection and classification of wireless capsule endoscopy images using RGB masking
Published 2016“…Therefore, it would be extremely advantageous to develop an intelligent algorithm to inspect the WCE images. This research aims to develop an algorithm to enhance wireless capsule endoscopy images and analyses them to detect Ulcer located in small intestine. …”
Get full text
Get full text
Article
