Search Results - intelligent system ((across algorithm) OR (((rsa algorithm) OR (_ algorithm))))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation by Rong, Li, Shari, Zalina, Ab Kadir, Mohd Zainal Abidin

    Published 2025
    “…A thematic analysis of 40 peer-reviewed articles was conducted using ATLAS.ti, revealing three dominant research themes: intelligent algorithms, building performance simulation techniques, and adaptive design for climate change. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Application of phi (Φ), the golden ratio, in computing: a systematic review by Akhtaruzzaman, M, Tanvin, Jamal Uddin, Shafie, Amir Akramin, Shahryer, Fahim, Halder, Sachitra

    Published 2024
    “…This article systematically examines φ’s diverse applications in computing, focusing on its role in enhancing visual appeal, optimizing algorithms, system design, and influencing fields such as biometrics, machine intelligence, and engineering. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Hybrid firefly algorithm and you only look once v8 framework (FA-YOLOv8) for traffic light detection by Muhammad Adhwa, Mohd Salemi, Muhammad Arif, Mohamad, Zalili, Musa

    Published 2026
    “…Accurate traffic light detection is a critical component of intelligent transportation systems and autonomous driving. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Fitness-guided particle swarm optimization with adaptive Newton-Raphson for photovoltaic model parameter estimation by Premkumar M., Ravichandran S., Hashim T.J.T., Sin T.C., Abbassi R.

    Published 2025
    “…Comprehensive simulation studies across various case scenarios demonstrate that the proposed method markedly outperforms existing state-of-the-art optimization algorithms. …”
    Article
  16. 16

    Channel-aware downlink scheduling for quality of service in long term evolution network by Najim, Alaa Omer

    Published 2018
    “…The proposed algorithm using system-level simulation experiments with performance comparison with DBWPF in terms of end-to-end delay, fairness, system throughput, Packet Loss Ratio (PLR), and spectral efficiency was evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Computational intelligence: It’s application in digital watermarking by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Abdul Latif, Khairun Nisaa’

    Published 2013
    “…It was found that ANN based watermarking outperformed the No ANN algorithm in terms of imperceptibility. It is anticipated that this paper will serve as a launch pad for researchers interested in intelligent watermarking.…”
    Get full text
    Get full text
    Article
  20. 20

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
    Article