Search Results - intelligence _ ((rsa algorithm) OR (window algorithm))
Search alternatives:
- window algorithm »
- rsa algorithm »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
-
4
Enhancement on the modified artificial bee colony algorithm to optimize the vehicle routing problem with time windows
Published 2022“…The Artificial Bee Colony (ABC) is a popular swarm intelligence algorithm for COP. In this study, existing Modified ABC (MABC) algorithm is revised to solve the VRPTW. …”
Get full text
Get full text
Thesis -
5
Network calculus-based latency for time-triggered traffic under Flexible Window-Overlapping Scheduling (FWOS) in a Time-Sensitive Network (TSN)
Published 2021“…Accordingly, more relaxed scheduling algorithms are required. In this paper, we introduce the flexible window-overlapping scheduling (FWOS) algorithm that optimizes the overlapping among TT windows by three different metrics: the priority of overlapping, the position of overlapping, and the overlapping ratio (OR). …”
Get full text
Get full text
Article -
6
Design of intelligent Qira’at identification algorithm
Published 2017Get full text
Get full text
Thesis -
7
Implementation of an intelligent SINS navigator based on ANFIS
Published 2009“…In this work an intelligent navigator developed to overcome the limitations of existing Strapdown Inertial Navigation Systems (SINS) algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
8
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
9
Intelligent motion planning of a mobile robot by using convolutional neural network / Siti Asmah Abdullah
Published 2019“…Several algorithms are used to create the Windowing Grid in capturing the informative and relevant current position of the mobile robot. …”
Get full text
Get full text
Get full text
Thesis -
10
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
A study of frame timing synchronization for WiMAX applications
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
14
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The simulation results show the AMS algorithm significantly improves the performance over RSA-MSDU and the standard for real-time traffic in terms of reducing average delay and packet loss up to 56% and 24% respectively. …”
Get full text
Get full text
Thesis -
15
Application of minimax algorithm in dots and boxes game
Published 2025“…The methodology involved implementing the Minimax algorithm as the primary decision-making engine for the AI. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Simulation and Visualization of TSP Using Ant Colony Optimization
Published 2023“…The Travelling Salesman Problem (TSP) is a well-known algorithmic problem its main objective is optimization. …”
Get full text
Get full text
Get full text
Article -
17
Snake detection system using convolutional neural network / Muhammad Danial Ahmad Tarmizi
Published 2020“…This project uses Convolutional Neural Network algorithms which is one the best algorithms for image processing. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
Genetic algorithm for event scheduling system
Published 2010“…As for the development environment, UTeM-EAS is developed and to run in windows XP with support of Adobe Dreamweaver and MS SQL Server. …”
Get full text
Get full text
Get full text
Article
