Search Results - intelligence a ((cross algorithm) OR (rsa algorithm))
Search alternatives:
- cross algorithm »
- intelligence a »
- rsa algorithm »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
A new Doppler Spread Estimation Algorithm Based on Zero Crossings of The Auto-correlation
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
6
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
Genetic algorithm application for traffic light control
Published 2023“…In this paper, we describe the design of an intelligent traffic light control based on genetic algorithm. …”
Conference paper -
9
A case study of microarray breast cancer classification using machine learning algorithms with grid search cross validation
Published 2023“…Machine learning is a subfield of artificial intelligence (AI) and computer science that uses data and algorithms to mimic how humans learn, and gradually improving its accuracy. …”
Get full text
Get full text
Get full text
Article -
10
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
Conference Paper -
11
Speech enhancement using deep neural network based on mask estimation and harmonic regeneration noise reduction for single channel microphone
Published 2022“…As a result, the trained model with GF-TF features and cross-speech dataset produced promising results, while the proposed target mask scored higher on the perceptual evaluation of speech quality (PESQ) and short-time objective intelligibility (STOI) tests. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
13
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The aim of this thesis is to develop a fair and efficient packet scheduling and adaptive bandwidth allocation algorithms to support QoS for a diverse service class for A-MSDU aggregation in IEEE 802.1 In network. …”
Get full text
Get full text
Thesis -
14
Inverse kinematic solution in handling 3R manipulator via real-time genetic algorithm
Published 2023Conference paper -
15
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…Since KNN is the simplest form of artificial intelligence, future work could combine this algorithm with other classification algorithm. …”
Get full text
Get full text
Thesis -
16
Cross cultural competence, human resource management practices, cross cultural adjustment and adaptive performance among Jordanian military leaders in United Nations peacekeeping
Published 2014“…Hence a gap remains in the literature. This study fills the gap by examining the relationships that exist between cross-cultural competence, human resource management practices, cross-cultural adjustment and adaptive performance by using a sample of 279 Jordanian military leaders who participated in the United Nations missions. …”
Get full text
Get full text
Get full text
Thesis -
17
Sustainable energy management: Artificial intelligence-based electricity consumption prediction in limited dataset environment for industry applications
Published 2024“…In academia, this study proposed an innovative SLR-MLR predictive algorithm and utilized a novel statistical approach to evaluate and select the superior predictive algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Prediction of photovoltaic system output using hybrid Cuckoo Search Least Square Support Vector Machine / Muhammad Aidil Adha Aziz
Published 2019“…The CS algorithm is inspired by the life of a bird family, called Cuckoo. …”
Get full text
Get full text
Thesis -
19
Tracking using normalized cross correlation and color space
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Proposing an intelligent information retrieval (IIR) framework for shariah sources retrieval in Islamic financial industry
Published 2021“…This research serves as a cross-field research that integrate the field of technology, Islamic finance, legal, and Shariah for an innovation.…”
Get full text
Get full text
Get full text
Article
