Search Results - (( _ application bees algorithm ) OR ( its ((application rsa) OR (application use)) algorithm ))*
Search alternatives:
- application bees »
- application rsa »
- application use »
- bees algorithm »
-
1
-
2
Optimal design of step – cone pulley problem using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Book Chapter -
3
-
4
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
5
Optimisation of Surface Roughness in 3D Printing Using the Bees Algorithm
Published 2025Get full text
Get full text
Get full text
Get full text
Book Chapter -
6
Bees algorithm for Forest transportation planning optimization in Malaysia
Published 2021“…Algorithm is widely used in various areas due to its ability to solve classes of problems. …”
Get full text
Get full text
Article -
7
Protein Conformantional Search Using Bees Algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…The assistant will provide suitable house recommendation to a home buyer based on particular information house specification such as house price, locations neighbourhood and surrounding information. This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
Get full text
Get full text
Thesis -
9
Artificial Bee Colony Algorithm for Pairwise Test Generation
Published 2017“…PABC progresses as a means to achieve the effective use of the artificial bee colony algorithm for pairwise testing reduction.…”
Get full text
Get full text
Get full text
Article -
10
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
Optimising a waste management system using the Artificial Bee Colony (ABC) algorithm
Published 2025“…This study proposed the application of the Artificial Bee Colony (ABC) algorithm to address the Capacitated Vehicle Routing Problem (CVRP) in a real-world waste collection scenario. …”
Get full text
Get full text
Student Project -
13
Enhanced artificial bee colony-least squares support vector machines algorithm for time series prediction
Published 2014“…This study proposed a hybrid algorithm, based on Artificial Bee Colony (ABC) and LSSVM, that consists of three algorithms; ABC-LSSVM, lvABC-LSSVM and cmABC-LSSVM. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
Comparative analysis of spiral dynamic algorithm and artificial bee colony optimization for position control of flexible link manipulators
Published 2024“…Interestingly, the manipulator's behaviours using the spiral dynamics algorithm for PID controller tuning were superior to those using alternative methods. …”
Get full text
Get full text
Get full text
Article -
16
-
17
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
18
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
19
A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets
Published 2021“…This study proposed an enhanced algorithm called hellingerant-tree-miner (HATM) which is inspired by ant colony optimization (ACO) metaheuristic for imbalanced learning using decision tree classification algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper
