Search Results - intelligence based ((((what algorithm) OR (rsa algorithm))) OR (based algorithm))

Refine Results
  1. 1
  2. 2
  3. 3

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Designing and Developing an Intelligent Congkak by Muhammad Safwan, Mohd Shahidan

    Published 2011
    “…This issues can solved by programming the Congkak system based on previous work on Mancala and NN system, and then recording the performance of the related algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…It provides a systematic overview of major post-quantum cryptographic families, including lattice-based, hash-based, code-based, multivariate, and isogeny-related schemes, and evaluates their current security assumptions, practical efficiency, and readiness for real-world deployment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Using artificial intelligence search in solving the camera placement problem by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P.

    Published 2022
    “…The placement results obtained based on those algorithms are critically compared in terms of the algorithmsâ�� efficiency and performance. …”
    Get full text
    Get full text
    Book
  8. 8

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Design of artificial intelligence based speed estimator for DC drives / Pauziah Saleh by Saleh, Pauziah

    Published 2006
    “…This thesis describes the design of Artificial Intelligence Based speed estimator for separately excited DC motor using feedforward backpropagation method. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  13. 13

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…In the agent-based approach to middleware, the agent’s property such as autonomous, mobile and intelligent are suitable as e-assistance tool for big data management. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Ontology based approach to Fuzzy student model design by Muhammad Sani, Salisu, Mohd Aris, Teh Noranis

    Published 2014
    “…An important component of these elearning systems in use today is called the intelligent tutoring system (ITS). ITS is a software system designed using artificial intelligent techniques (comprising of Fuzzy Logic, Neural-Networks, Bayesian networks, Ontology, Genetic Algorithms and Software Agents) to provide a personalized tutoring adaptable to each student based on his/her profile or characteristics. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    What, how and when to use knowledge in neural network application by Wan Ishak, Wan Hussain, Abdul Rahman, Shuzlina

    Published 2004
    “…These weights are assigned randomly or generated using other procedures such as Nguyen-Widrow initialization algorithm. After training, the weights are stored and recalled in application phase. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19
  20. 20