Search Results - (( based application ((ant algorithm) OR (rsa algorithm)) ) OR ( _ applications usage algorithm ))*
Search alternatives:
- applications usage »
- based application »
- _ applications »
- ant algorithm »
- rsa algorithm »
-
1
Green vehicle traffic routing system using ant-based algorithm
Published 2015Get full text
Get full text
Article -
2
Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System
Published 2013“…Using the existing lawnmower methods incur substantial costs in terms of time, accuracy and reliability. Therefore, the usage of a swarming robotic system is proposed. In this thesis, a simple framework and methodology in developing a bio-inspired algorithm for cooperative swarming robotic application has been developed. …”
Get full text
Get full text
Thesis -
3
-
4
Ant-based vehicle congestion avoidance framework using vehicular networks / Mohammad Reza Jabbarpour Sattari
Published 2015“…AVCAF collects real-time traffic data through vehicular networks to consider non-recurring congestion conditions in its routing mechanism via ant-based algorithm. The proposed framework is evaluated and validated through simulation environment. …”
Get full text
Get full text
Thesis -
5
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A Hybrid Metaheuristic Technique Based on Grey Wolf Optimisation, Symbiotic Organism Search, and Ant Colony Optimisation for Solving Multi-Objective Vehicle Routing Problems
Published 2025“…For objective two, three routing strategies were evaluated. Based on a single-vehicle optimal route, the algorithm provided the shortest distance, 91.74 km. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
9
An adaptive ant colony optimization algorithm for rule-based classification
Published 2020“…Ant-Miner is a variant of ant colony optimisation and a prominent intelligent algorithm widely use in rules-based classification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
11
-
12
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
13
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
14
-
15
QoS based fair load-balancing: paradigm to IANRA routing algorithm for wireless networks (WNs)
Published 2008Get full text
Get full text
Conference or Workshop Item -
16
-
17
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
18
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
19
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
20
A new multiple ant colonies optimization algorithm utilizing average pheromone evaluation mechanism
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item
