Search Results - intelligence system ((rsa algorithm) OR (((new algorithm) OR (tree algorithm))))
Search alternatives:
- intelligence system »
- tree algorithm »
- rsa algorithm »
- new algorithm »
-
1
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
2
Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Get full text
Article -
3
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021Get full text
Get full text
Get full text
Article -
4
-
5
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
6
Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System
Published 2008“…This study has explored an intelligent video surveillance system, presented by real time moving detection, object classification and interpreting the activity of the people by employing image segmentation and new approach in artificial intelligence called artificial immune system. …”
Get full text
Get full text
Thesis -
7
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…In addition, the revealed results contribute to the new perspective of designing planting lining for area optimization by computerized system.…”
Get full text
Get full text
Thesis -
8
An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM)
Published 2024“…This study recommends a selection trade-off as the function of prediction efficiency and efficacy of the algorithm. Particularly, the proposed optimized Bagged Trees are the most effective algorithm for energy demand prediction applications, and the proposed optimized Medium Trees are the most efficient algorithm for real-time systems. …”
Get full text
Get full text
Thesis -
9
Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Get full text
Article -
10
Modeling of static and dynamic components of bio-nanorobotic systems
Published 2012“…In addition, a graph algorithm based on greedy methods is employed to compute a new set of optimal weighted electronic properties of the fullerenes via computing their Minimum Weight Spanning Trees (MWSTs). …”
Get full text
Get full text
Thesis -
11
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
12
Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment
Published 2021“…After using the RANSAC algorithm to remove the map ground, the European clustering algorithm is used for point cloud segmentation. …”
Get full text
Get full text
Get full text
Article -
13
An efficient and effective case classification method based on slicing
Published 2006“…The algorithms are: Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5). …”
Get full text
Get full text
Get full text
Article -
14
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
15
Improvement on agglomerative hierarchical clustering algorithm based on tree data structure with bidirectional approach
Published 2024Subjects:Conference Paper -
16
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
17
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…Fortunately, Artificial Intelligence (AI) has recently attracted a lot of attention, and it is now a principal component of these systems. …”
Get full text
Get full text
Article -
18
Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea
Published 2018“…This research develops a knowledge-based system by using computational intelligent approaches based on Boosting algorithms on decision trees augmented by pruning techniques and Association Rule Mining. …”
Get full text
Get full text
Thesis -
19
-
20
