Search Results - (( _ application rsa algorithm ) OR ( its applications ((bat algorithm) OR (new algorithm)) ))
Search alternatives:
- its applications »
- application rsa »
- rsa algorithm »
- bat algorithm »
- new algorithm »
-
1
Modified adaptive bats sonar algorithm with doppler effect mechanism for solving single objective unconstrained optimization problems
Published 2019Get full text
Get full text
Conference or Workshop Item -
2
New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems
Published 2024“…The Modified Adaptive Bats Sonar Algorithm (MABSA), initially designed for single objective optimization and inspired by colony bats' echolocation, has demonstrated efficiency with its simple structure and reduced computation time. …”
Get full text
Get full text
Thesis -
3
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
4
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
5
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
6
-
7
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
8
-
9
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
10
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…The works related to swarm intelligence algorithms include the development of the algorithm itself, its modification and improvisation as well as its application in solving global optimisation problems. …”
Get full text
Get full text
Thesis -
12
-
13
A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm
Published 2013“…Each bat in Bat Algorithm represents a candidate solution for the problem and each dimension in the search space of the Bat Algorithm represents a parameter of intrinsic parameters: skew, focal length, and magnification factor. …”
Get full text
Get full text
Conference or Workshop Item -
14
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
An improved genetic bat algorithm for unconstrained global optimization problems
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
19
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
20
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper
