Search Results - (( _ application ((tree algorithm) OR (bees algorithm)) ) OR ( some applications rsa algorithm ))
Search alternatives:
- some applications »
- applications rsa »
- tree algorithm »
- bees algorithm »
- rsa algorithm »
-
1
A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets
Published 2021“…Ant-tree-miner (ATM) has an advantage over the conventional decision tree algorithm in terms of feature selection. …”
Get full text
Get full text
Get full text
Article -
2
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
3
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
6
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
7
-
8
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
9
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
10
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007“…This paper describes a new application of the Bees Algorithm to the optimization of a Support Vector Machine (SVM) for the problem of classifying defects in plywood. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Application of the bees algorithm to the selection features for manufacturing data
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Application of Bee Colony Optimization (BCO) in NP-Hard Problems
Published 2011Get full text
Get full text
Final Year Project -
14
Optimal design of step – cone pulley problem using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Book Chapter -
15
Application of the Bees Algorithm to find optimal drill path sequence
Published 2024Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Assembly sequence optimization using the bees algorithm
Published 2022Get full text
Get full text
Get full text
Get full text
Book Chapter -
18
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
19
Optimisation of Surface Roughness in 3D Printing Using the Bees Algorithm
Published 2025Get full text
Get full text
Get full text
Get full text
Book Chapter -
20
