Search Results - intelligence based ((((rsa algorithm) OR (new algorithm))) OR (drops algorithm))
Search alternatives:
- intelligence based »
- rsa algorithm »
- new algorithm »
-
1
-
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
-
4
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…By inheriting the capabilities of XML SOAP technology and Web Services, three new algorithms based on Event-Condition-Action (ECA) paradigm have been developed to facilitate efficient interoperation of the heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
5
Intelligent Examination Timetabling System Using Hybrid Intelligent Water Drops Algorithm
Published 2024“…Intelligent Water Drops algorithm (IWD) is a population-based algorithm where each drop represents a solution and the sharing between the drops during the search lead to better drops. …”
Proceedings Paper -
6
Intelligent examination timetabling system using hybrid intelligent water drops algorithm
Published 2015“…This paper proposes Hybrid Intelligent Water Drops (HIWD) algorithm to solve Tamhidi programs uncapacitated examination timetabling problem in Universiti Sains Islamic Malaysia (USIM).Intelligent Water Drops algorithm (IWD) is a population-based algorithm where each drop represents a solution and the sharing between the drops during the search lead to better drops.The results of this study prove that the proposed algorithm can produce a high quality examination timetable in shorter time in comparison with the manual timetable.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Solving university examination timetabling problem using intelligent water drops algorithm
Published 2024Subjects: “…Intelligent water drops algorithm…”
Conference Paper -
8
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
9
Modified And Ensemble Intelligent Water Drop Algorithms And Their Applications
Published 2015“…Pertama, algoritma TAC yang diubahsuai, diperkenalkan. The Intelligent Water Drop (IWD) algorithm is a swarm-based model that is useful for undertaking optimization problems. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
Solving University Examination Timetabling Problem Using Intelligent Water Drops Algorithm
Published 2024“…IWD is a recent metaheuristic population-based algorithm belonging to swarm intelligent category which simulate river system. …”
Proceedings Paper -
13
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
14
-
15
Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems
Published 2024“…This thesis presents an investigation of using the Intelligent Water Drops (IWD) algorithm to construct and produce good quality solutions for the UETP. …”
thesis::doctoral thesis -
16
A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines
Published 2017“…However, these methods are less effective when the non-linearity, complexity, and modeling uncertainties of the system increase. In recent years, a new discipline, known as artificial intelligence-based methods, has emerged, which allows the behavior of the system to be studied using operational data. …”
Get full text
Get full text
Article -
17
-
18
Estimation-based Metaheuristics: A New Branch of Computational Intelligence
Published 2016“…In this paper, a new branch of computational intelligence named estimation-based metaheuristic is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
19
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
