Search Results - (( based application ((bee algorithm) OR (rsa algorithm)) ) OR ( some applications a algorithm ))
Search alternatives:
- based application »
- some applications »
- applications a »
- bee algorithm »
- rsa algorithm »
- a algorithm »
-
1
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
Get full text
Get full text
Thesis -
2
-
3
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
4
Pairwise Test Suite Generation Based on Hybrid Artificial Bee Colony Algorithm
Published 2020“…There are many researchers that have been developed a pairwise testing strategy. Complementing to the earlier researches, this paper proposes a new pairwise test suite generation called Pairwise Hybrid Artificial Bee Colony (PhABC) strategy based on hybridize of an Artificial Bee Colony (ABC) algorithm with a Particle Swarm Optimization (PSO) algorithm. …”
Get full text
Get full text
Article -
5
-
6
-
7
-
8
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
9
-
10
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
11
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…Artificial neuro-glial networks is proposed to be combined in the swarm-based communication algorithm to provide a human-like model for the robot's communication and optimization.…”
Get full text
Get full text
Monograph -
12
-
13
Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System
Published 2013“…Therefore, the usage of a swarming robotic system is proposed. In this thesis, a simple framework and methodology in developing a bio-inspired algorithm for cooperative swarming robotic application has been developed. …”
Get full text
Get full text
Thesis -
14
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
-
17
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
18
Improving the modeling capacity of Volterra model using evolutionary computing methods based on Kalman Smoother adaptive filter
Published 2015“…The first step is combining the forward and backward estimator in the original Volterra model; the second step is reformulating the Volterra model into a state-space model so that the Kalman Smoother (KS) adaptive filter can be used to estimate the kernel coefficients; the third step is optimization of KS parameters using evolutionary computing algorithms such as particle swarm optimization (PSO), genetic algorithm (GA) and artificial bee colony (ABC). …”
Get full text
Get full text
Article -
19
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
20
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter
