Search Results - intelligence system ((drops algorithm) OR (((rsa algorithm) OR (based algorithm))))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Solving University Examination Timetabling Problem Using Intelligent Water Drops Algorithm by Aldeeb, BA, Norwawi, NM, Al-Betar, MA, Bin Jali, MZ

    Published 2024
    “…IWD is a recent metaheuristic population-based algorithm belonging to swarm intelligent category which simulate river system. …”
    Proceedings Paper
  7. 7

    Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems by Bashar AbedAl Mohdi Talal AlDeeb

    Published 2024
    “…The IWD is a recent metaheuristic population-based algorithm belonging to the swarm intelligent category which simulates the dynamic of the river systems. …”
    thesis::doctoral thesis
  8. 8
  9. 9
  10. 10

    Hybrid model to improve the river streamflow forecasting utilizing multi-layer perceptron-based intelligent water drop optimization algorithm by Pham Q.B., Afan H.A., Mohammadi B., Ahmed A.N., Linh N.T.T., Vo N.D., Moazenzadeh R., Yu P.-S., El-Shafie A.

    Published 2023
    “…Complex networks; Drops; Forecasting; Iterative methods; Network architecture; Network layers; Optimization; Rivers; Stochastic models; Stochastic systems; Stream flow; Time series; Engineering applications; Gradient-decent algorithm; Intelligent Water Drops (IWD); Multi layer perceptron; Multi-layer perceptron neural networks; Optimization algorithms; Streamflow forecasting; Time series prediction; Multilayer neural networks…”
    Article
  11. 11

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A real-time integrated fire detection and alarm (FDA) system for network based building automation by Anwar, Farhat, Islam, Rounakul, Hussain, Sabahat, Rashid, Muhammad Mahbubur, Shaikh, Zuhaib

    Published 2017
    “…This work proposes an improved framework for FDA system to ensure a robust, intelligent network of FDA control panels in real-time. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article
  20. 20

    A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines by Tahan, M., Muhammad, M., Abdul Karim, Z.A.

    Published 2017
    “…However, these methods are less effective when the non-linearity, complexity, and modeling uncertainties of the system increase. In recent years, a new discipline, known as artificial intelligence-based methods, has emerged, which allows the behavior of the system to be studied using operational data. …”
    Get full text
    Get full text
    Article