Search Results - (( _ application bees algorithm ) OR ( ((model application) OR (code application)) rsa algorithm ))
Search alternatives:
- model application »
- application bees »
- code application »
- bees algorithm »
- rsa algorithm »
-
1
-
2
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
3
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
Get full text
Get full text
Student Project -
4
Implementation of RSA algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
5
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
6
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
7
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
9
-
10
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007“…This paper describes a new application of the Bees Algorithm to the optimization of a Support Vector Machine (SVM) for the problem of classifying defects in plywood. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Application of the bees algorithm to the selection features for manufacturing data
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Application of Bee Colony Optimization (BCO) in NP-Hard Problems
Published 2011Get full text
Get full text
Final Year Project -
14
Optimal design of step – cone pulley problem using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Book Chapter -
15
Application of the Bees Algorithm to find optimal drill path sequence
Published 2024Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Assembly sequence optimization using the bees algorithm
Published 2022Get full text
Get full text
Get full text
Get full text
Book Chapter -
18
Optimisation of Surface Roughness in 3D Printing Using the Bees Algorithm
Published 2025Get full text
Get full text
Get full text
Get full text
Book Chapter -
19
-
20
