Search Results - intelligence system ((((across algorithm) OR (rsa algorithm))) OR (based algorithm))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation by Rong, Li, Shari, Zalina, Ab Kadir, Mohd Zainal Abidin

    Published 2025
    “…A thematic analysis of 40 peer-reviewed articles was conducted using ATLAS.ti, revealing three dominant research themes: intelligent algorithms, building performance simulation techniques, and adaptive design for climate change. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Channel-aware downlink scheduling for quality of service in long term evolution network by Najim, Alaa Omer

    Published 2018
    “…Initially, a range of constraints was defined based on a recent algorithm from the literature, namely Delay Based Weighted Proportional Fair (DBWPF). …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Computational intelligence: It’s application in digital watermarking by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Abdul Latif, Khairun Nisaa’

    Published 2013
    “…It was found that ANN based watermarking outperformed the No ANN algorithm in terms of imperceptibility. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Systematic review on ai-blockchain based e-healthcare records management systems by Haddad, Alaa, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Hasbullah, Nurul Fadzlin, Zabidi, Suriza Ahmad

    Published 2022
    “…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Innovating communication adaptation on social media using AI-based decision support systems by Zakaria, Noor Azura, Adriana, Dadi, Budi, Danang Surya, Mardiana, Mardiana, Rafika, Ageng Setiani, Asmawati, Ari

    Published 2025
    “…Leveraging intelligent algorithms, the research investigates mechanisms that enable dynamic analysis and personalized recommendations to improve message clarity, relevance, and impact. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Systematic review on ai-blockchain based e-healthcare records management systems by Haddad, Alaa, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Hasbullah, Nurul Fadzlin, Zabidi, Suriza Ahmad

    Published 2022
    “…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  20. 20

    A Modular Intelligent Control Framework for Scalable Biohydrogen Production in Microbial Electrolysis Cells by Mohd Farid, Atan, Mohamad Afiq, Mohd Asrul, Andrica Claudia, Henry, Hafizah, Abdul Halim Yun, Ivy Tan, Ai Wei, Josephine Lai, Chang Hui

    Published 2025
    “…This review traces the evolution of five control paradigms, including voltage/proportional-integral-derivative (PID), model-based, adaptive, fuzzy logic, and artificial-intelligence (AI) systems, as well as hybrid intelligent controllers, and benchmarks each against scalability, dynamic responsiveness, and energy-recovery performance. …”
    Get full text
    Get full text
    Get full text
    Article