Search Results - intelligence _ ((true algorithm) OR (rsa algorithm))
Search alternatives:
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
A true annealing approach to the marriage in honey-bees optimization algorithm
Published 2003“…Marriage in Honey-Bees Optimization is a new swarm intelligence technique inspired by the marriage process of honey-bees. …”
Get full text
Get full text
Get full text
Article -
4
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Subjects:Conference Paper -
5
Development of an intelligent information system for financial analysis depend on supervised machine learning algorithms
Published 2022“…For the objective of classifying FI in terms of fraud or not, the Intelligent Information System for Financial Institutions (IISFI) relying on Supervised ML (SML) Algorithms has been created in this work. …”
Get full text
Get full text
Article -
6
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
7
Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman
Published 2020“…Even though A* is the most popular algorithm amongst game developers, it's hardly the best algorithm in finding the true shortest path. …”
Get full text
Get full text
Thesis -
8
-
9
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
Proceedings Paper -
10
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…This new method can differentiate between erroneous readings and true events in a distributed manner. The FD idea has previously been used to solve security problems, while military intelligence operations have inspired the TMS and have never been used in WSNs. …”
Get full text
Get full text
Article -
12
Combined generative adversarial network and fuzzy C-means clustering for multi-class voice disorder detection with an imbalanced dataset
Published 2020“…Lastly, the proposed CGAN-IFCM outperforms existing models in its true negative rate and true positive rate by 9.9-12.9 and 9.1-44.8, respectively. …”
Get full text
Get full text
Article -
13
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…An intelligence strategy called quasi-oppositional based learning is incorporated into the proposed algorithm to enhance its convergence property, exploration capability, and solution optimality. …”
Get full text
Get full text
Get full text
Article -
14
Encryption function on artificial neural network
Published 2016“…The images generated by applying each algorithm were tested for their regularity and residual intelligibility. …”
Get full text
Get full text
Article -
15
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
16
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The simulation results show the AMS algorithm significantly improves the performance over RSA-MSDU and the standard for real-time traffic in terms of reducing average delay and packet loss up to 56% and 24% respectively. …”
Get full text
Get full text
Thesis -
17
Recognition of human motion from qualitative normalised templates
Published 2007Get full text
Get full text
Article -
18
-
19
-
20
Potential of Metal Artifact Reduction (MAR) and Deep Learning-based Reconstruction (DLR) algorithms integration in CT Metal Artifact Correction: a review
Published 2024“…Current DLR implementations like TrueFidelity and Advanced Intelligent Clear-IQ Engine (AiCE) demonstrate promising outcomes. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
