Search Results - (( _ application rsa algorithm ) OR ( its application ((new algorithm) OR (bees algorithm)) ))
Search alternatives:
- application rsa »
- bees algorithm »
- rsa algorithm »
- new algorithm »
-
1
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
2
Performance Enhancement Of Artificial Bee Colony Optimization Algorithm
Published 2013“…Artificial Bee Colony (ABC) algorithm is a recently proposed bio-inspired optimization algorithm, simulating foraging phenomenon of honeybees. …”
Get full text
Get full text
Thesis -
3
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
4
HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation
Published 2021“…Consequently, a new meta-heuristic based t -way strategy called Hybrid Artificial Bee Colony (HABCSm) strategy, based on merging the advantages of the Artificial Bee Colony (ABC) algorithm with the advantages of a Particle Swarm Optimization (PSO) algorithm is proposed in this paper. …”
Get full text
Get full text
Article -
5
HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation
Published 2021“…Consequently, a new meta-heuristic based t -way strategy called Hybrid Artificial Bee Colony (HABCSm) strategy, based on merging the advantages of the Artificial Bee Colony (ABC) algorithm with the advantages of a Particle Swarm Optimization (PSO) algorithm is proposed in this paper. …”
Get full text
Get full text
Article -
6
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
7
Development Of Artificial Bee Colony (Abc) Variants And Memetic Optimization Algorithms
Published 2017“…One of BIAs, artificial bee colony (ABC) optimization algorithm, has shown excellent performance in many applications compared to other optimization algorithms. …”
Get full text
Get full text
Thesis -
8
-
9
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
10
-
11
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
12
Acoustic emission partial discharge localization in oil based on artificial bee colony
Published 2025“…Scout bees were set out whenever a bee exceeded the limit of abandonment to discover possible PD locations in new areas of the search space. …”
Get full text
Get full text
Get full text
Article -
13
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
14
Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm
Published 2010“…In this project, angles based control with Bees Optimization search algorithm were adopted to search with guidance the protein conformational space in order to find the optimum solution. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
17
Hybrid Metaheuristic Algorithm for Short Term Load Forecasting
Published 2016Get full text
Get full text
Get full text
Article -
18
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project
