Search Results - intelligence based ((((via algorithm) OR (based algorithm))) OR (rsa algorithm))
Search alternatives:
- intelligence based »
- via algorithm »
- rsa algorithm »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
Get full text
Get full text
Get full text
Article -
3
-
4
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
5
-
6
Adaptable algorithms for performance optimization of dynamic batch manufacturing processes
Published 2018“…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
Get full text
Get full text
Get full text
Thesis -
7
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
8
Computational intelligence based power tracing for nondiscriminatory losses charge allocation and voltage stability improvement. / Zulkifli Abdul Hamid
Published 2013“…At first, in producing a good optimization algorithm, a hybridization technique was proposed for adopting the finest features of two different algorithms; namely the Genetic Algorithm (GA) and continuous domain Ant Colony Optimization (ACOR). …”
Get full text
Get full text
Book Section -
9
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
Article -
10
Consumption-Based Priority Algorithm for Energy Consumption
Published 2024“…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Consumption-Based Priority Algorithm for Energy Consumption
Published 2024“…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…It provides a systematic overview of major post-quantum cryptographic families, including lattice-based, hash-based, code-based, multivariate, and isogeny-related schemes, and evaluates their current security assumptions, practical efficiency, and readiness for real-world deployment. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…The results confirm the higher accuracy and reliability of the proposed method as compared with other artificial intelligence based models. On the basis of the favorable results obtained, it can be concluded that recent enhancements in AI-based approaches, as in this study, could result higher accuracy with the least complexity for long-term EEC forecasting. …”
Get full text
Get full text
Get full text
Thesis -
14
Detection of eye movements based on EEG signals and the SAX algorithm
Published 2018Get full text
Get full text
Conference or Workshop Item -
15
Consumption-Based Priority Algorithm for Energy Consumption
Published 2025“…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
Article -
16
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
17
Hub Angle Control for A Single Link Flexible Manipulator Based on Cuckoo Search Algorithm
Published 2021“…System identification was implemented via swarm intelligence algorithm known as cuckoo search algorithms based on auto regressive with exogenous model structure. …”
Get full text
Get full text
Get full text
Proceeding -
18
Modeling of static and dynamic components of bio-nanorobotic systems
Published 2012“…In addition, a graph algorithm based on greedy methods is employed to compute a new set of optimal weighted electronic properties of the fullerenes via computing their Minimum Weight Spanning Trees (MWSTs). …”
Get full text
Get full text
Thesis -
19
Intelligent technique for grading tropical fruit using magnetic resonance imaging
Published 2013“…Levenberg-Marquardt algorithm (trainlm) gave the best performance fitness out of different types of backpropagation algorithm used with least Mean Square Error (MSE) of 0.0814 corresponding to R-value of 0.8094. …”
Get full text
Get full text
Get full text
Article -
20
