Search Results - intelligence system ((across algorithm) OR (((rsa algorithm) OR (_ algorithm))))
Search alternatives:
- intelligence system »
- across algorithm »
- rsa algorithm »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
5
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
-
7
A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation
Published 2025“…A thematic analysis of 40 peer-reviewed articles was conducted using ATLAS.ti, revealing three dominant research themes: intelligent algorithms, building performance simulation techniques, and adaptive design for climate change. …”
Get full text
Get full text
Get full text
Article -
8
Application of phi (Φ), the golden ratio, in computing: a systematic review
Published 2024“…This article systematically examines φ’s diverse applications in computing, focusing on its role in enhancing visual appeal, optimizing algorithms, system design, and influencing fields such as biometrics, machine intelligence, and engineering. …”
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
-
12
A Focal load balancer based algorithm for task assignment in cloud environment
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Hybrid firefly algorithm and you only look once v8 framework (FA-YOLOv8) for traffic light detection
Published 2026“…Accurate traffic light detection is a critical component of intelligent transportation systems and autonomous driving. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Fitness-guided particle swarm optimization with adaptive Newton-Raphson for photovoltaic model parameter estimation
Published 2025“…Comprehensive simulation studies across various case scenarios demonstrate that the proposed method markedly outperforms existing state-of-the-art optimization algorithms. …”
Article -
16
Channel-aware downlink scheduling for quality of service in long term evolution network
Published 2018“…The proposed algorithm using system-level simulation experiments with performance comparison with DBWPF in terms of end-to-end delay, fairness, system throughput, Packet Loss Ratio (PLR), and spectral efficiency was evaluated. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
-
19
Computational intelligence: It’s application in digital watermarking
Published 2013“…It was found that ANN based watermarking outperformed the No ANN algorithm in terms of imperceptibility. It is anticipated that this paper will serve as a launch pad for researchers interested in intelligent watermarking.…”
Get full text
Get full text
Article -
20
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article
