Search Results - intelligence system ((((via algorithm) OR (rsa algorithm))) OR (based algorithm))
Search alternatives:
- intelligence system »
- via algorithm »
- rsa algorithm »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
4
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
5
Decentralized Intelligent PID based controller tuned by Evolutionary Algorithm for Double Link Flexible Robotic Manipulator with Experimental Validation
Published 2018“…Experimental results show that the proposed control algorithm managed to control the system to reach desired angle for both hub at lower overshoot. …”
Get full text
Get full text
Get full text
Proceeding -
6
-
7
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
Article -
8
Computational intelligence based power tracing for nondiscriminatory losses charge allocation and voltage stability improvement. / Zulkifli Abdul Hamid
Published 2013“…Without treating the power system to be lossless, the tracing results are based on actual system condition; which means that they are consistent. …”
Get full text
Get full text
Book Section -
9
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Consumption-Based Priority Algorithm for Energy Consumption
Published 2024“…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Consumption-Based Priority Algorithm for Energy Consumption
Published 2024“…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
Get full text
Get full text
Get full text
Article -
12
TUNING A THREE-PHASE SEPARATOR LEVEL CONTROLLER VIA PARTICLE SWARM OPTIMIZATION (PSO) ALGORITHM
Published 2013“…In our case, the global best position is replaced with the optimized PID tuning parameters for the separator. The PSO algorithm has been used in several other applications such as the Brushless DC motor and in the Control Ball & Beam system. …”
Get full text
Get full text
Final Year Project -
13
Malaysia solar energy experience: intelligent fault location algorithm for unbalanced radial distribution network including PV systems
Published 2016“…This paper presents a novel fault location algorithm based on the recording of short circuit power values at the primary substation of unbalanced radial distribution networks including PV systems. …”
Get full text
Get full text
Get full text
Article -
14
Hub Angle Control for A Single Link Flexible Manipulator Based on Cuckoo Search Algorithm
Published 2021“…System identification was implemented via swarm intelligence algorithm known as cuckoo search algorithms based on auto regressive with exogenous model structure. …”
Get full text
Get full text
Get full text
Proceeding -
15
Consumption-Based Priority Algorithm for Energy Consumption
Published 2025“…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
Article -
16
Tuning A Three-Phase Separator Level Controller via Particle Swarm OptimizationAlgorithm
Published 2019“…In our case, the global best position is replaced with the optimized PID tuning parameters for the separator. The PSO algorithm has been used in several other applications such as the Brushless DC motor and in the Control Ball Beam system. …”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
Active force control with iterative learning control algorithm for a vehicle suspension
Published 2013“…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
Get full text
Get full text
Thesis -
20
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis
