Search Results - (( _ application rsa algorithm ) OR ( some application ((search algorithm) OR (based algorithm)) ))
Search alternatives:
- some application »
- application rsa »
- rsa algorithm »
-
1
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
2
An experimental study of modified black hole algorithms
Published 2018“…Those algorithms are Black Hole White Hole Algorithm, Gravitational Black Hole Algorithm, Gravitational Black Hole White Hole Algorithm, Black Hole Local Search Algorithm, Black Hole White Hole Local Search Algorithm, Gravitational Black Hole Local Search Algorithm, and Gravitational Black Hole White Hole Local Search Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
3
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
6
-
7
-
8
Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem
Published 2008“…Genetic Algorithm as population-based methods are better identifying promising areas in the search space, while Tabu Search and Simulated Annealing as trajectory methods are better in exploring promising areas in search space. …”
Get full text
Get full text
Monograph -
9
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…The natural evolution optimization algorithm which is genetic algorithm can be improve by combining the nature meta-heuristic algorithms which is bald eagle search to improve the makespan of genetic algorithm using cloudsim that need to be implement on the eclipse platform. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
11
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
12
-
13
-
14
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…In the future, the efficiency of the result will be improved based on technology growth with adding some application such as GPS and map of the house in mobile version.…”
Get full text
Get full text
Thesis -
15
-
16
-
17
Optimization and discretization of dragonfly algorithm for solving continuous and discrete optimization problems
Published 2024“…Hence, optimization algorithms, consisting of exact and heuristic methods, are crucial for a myriad of real-world applications. …”
Get full text
Get full text
Thesis -
18
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
Get full text
Get full text
Thesis -
19
-
20
Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System
Published 2013“…In this thesis, a simple framework and methodology in developing a bio-inspired algorithm for cooperative swarming robotic application has been developed. …”
Get full text
Get full text
Thesis
