Search Results - intelligence based ((across algorithm) OR (((rsa algorithm) OR (new algorithm))))

Refine Results
  1. 1
  2. 2

    Exploring c Environment (S/O: 12826) by Abdul Rahman, Syariza, Ku Mahamud, Ku Ruhana, Ramli, Razamin, Benjamin, Aida Mauziah, Omar, Mohd Faizal

    “…The timetabling problem is to be rectified via hybridization of fly and suitable evolutionary algorithms. The Fruit Fly Optimization Algorithm (FOA) is a method that is still limited in optimization and artificial intelligence area. …”
    Get full text
    Get full text
    Monograph
  3. 3
  4. 4
  5. 5
  6. 6

    Distributed learning based energy-efficient operations in small cell networks by Mughees, Amna

    Published 2023
    “…Additionally, an intelligent distributed cooperative power allocation learning algorithm is proposed to enhance energy efficiency in small cell networks while satisfying the scalability, power constraint, user association requirements, and QoS constraints. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  8. 8

    Generation of synthetic 5G network dataset using Generative Adversarial Network (GAN) by Azman, Muhammad Amin, Abu-samah, Asma, Khatiman, Muhammad Nur Aqmal, Nordin, Rosdiadee, Abdullah, Nor Fadzilah

    Published 2024
    “…Generation of data use two types of GAN which are the Conditional Tabular GAN (CTGAN) and Topological Variational Autoencoder (TVAE). The two algorithms were compared based on statistical analysis such as the distribution and Pearson Correlation analysis. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Geospatial AI-based approach to assess the spatiotemporal suitability of onshore wind-solar farms in Iraq by Sachit, Mourtadha Sarhan Almushattat

    Published 2023
    “…In a separate third step, a new temporal criterion was developed based on temporal complementarity assessment between wind and solar resources. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A hybrid approach to improve recommendation system in E-tourism by Rahman M.M., Zaki Z.B.M., Alwi N.H.B.M., Monirul Islam M.

    Published 2024
    conference output::conference proceedings::conference paper
  13. 13

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14
  15. 15

    Estimation-based Metaheuristics: A New Branch of Computational Intelligence by Nor Hidayati, Abd Aziz, Zuwairie, Ibrahim, Saifudin, Razali, Nor Azlina, Ab. Aziz

    Published 2016
    “…In this paper, a new branch of computational intelligence named estimation-based metaheuristic is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…Firefly algorithm outperformed the other metaheuristic algorithms used to solve this proposed hybrid artificial intelligence model regarding parameter sensitivity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…A new case is retained in the case base for future retrievals. …”
    Conference paper
  20. 20

    Developing an intelligent system to acquire meeting knowledge in problem-based learning environments by Chiang, A., Baba, M.S.

    Published 2006
    “…MALESAbrain1-3 is an intelligent algorithm which originally is designed for problem-based learning (PBL) environment. …”
    Get full text
    Get full text
    Get full text
    Article