Search Results - (( _ application ((means algorithm) OR (ant algorithm)) ) OR ( its application rsa algorithm ))*

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots by Ismail, Amelia Ritahani, Tumian, Afidalina

    Published 2019
    “…The main idea in this algorithm is the indirect communication between the ants which is established by the means of pheromones in finding the shortest path between their nest and food [14]. …”
    Get full text
    Get full text
    Monograph
  5. 5
  6. 6
  7. 7
  8. 8

    Enhancing Solutions Of Capacity Vehicle Routing Problem Based On An Improvement Ant Colony System Algorithm by Mutar, Modhi Lafta, Mohd Aboobaider, Burhanuddin, Hameed, Asaad Shakir, Yusof, Norzihani

    Published 2019
    “…The results have been shown the IACS algorithm is better when compared to conventional metaheuristic methods for handling CVRP.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets by Mohd Razali, Muhamad Hasbullah, Saian, Rizauddin, Yap, Bee Wah, Ku-Mahamud, Ku Ruhana

    Published 2021
    “…Ant-tree-miner (ATM) has an advantage over the conventional decision tree algorithm in terms of feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    Automated recognition of Ficus deltoidea using ant colony optimization technique by Ishak, Asnor Juraiza, Che Soh, Azura, Marhaban, Mohammad Hamiruce, Khamis, Shamsul, Ghasab, Mohammad Ali Jan

    Published 2013
    “…Improving in the fields of soft computing and artificial intelligence, the branch study of automated herb recognition among plenty of weeds has become challenging issue due to their applications in medicine, food and industry. This paper presents innovative method to improve the accuracy of classification as well the efficiency, such that irrelevant features that make computational complexity are ignored by feature subset selection that is proposed by means of ant colony optimization algorithm (ACO). …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…The RSA algorithm can be used for both public key encryption and digital signatures. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Effectiveness of nature-inspired algorithms using ANFIS for blade design optimization and wind turbine efficiency by Sarkar, Md. Rasel, Julai, Sabariah, Chong, Wen Tong, Toha @ Tohara, Siti Fauziah

    Published 2019
    “…The difference between optimized and predicted is very small which implies the effectiveness of nature-inspired algorithms in this application. In addition, the value of RMSE and R2 of the ABC-ANFIS algorithm were lower (indicating that the result obtained is more accurate) than the ACO and PSO algorithms…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Effectiveness of Nature-Inspired Algorithms using ANFIS for Blade Design Optimization and Wind Turbine Efficiency by Sarkar, Md Rasel, Julai, Sabariah, Chong, Wen Tong, Toha, Siti Fauziah

    Published 2019
    “…The difference between optimized and predicted is very small which implies the effectiveness of nature-inspired algorithms in this application. In addition, the value of RMSE and R 2 of the ABC-ANFIS algorithm were lower (indicating that the result obtained is more accurate) than the ACO and PSO algorithms. © 2019 by the authors.…”
    Get full text
    Get full text
    Article