Search Results - (( based application ((rsa algorithm) OR (bee algorithm)) ) OR ( _ application among algorithm ))*
Search alternatives:
- based application »
- application among »
- among algorithm »
- rsa algorithm »
- bee algorithm »
-
1
Enhance key generation algorithm based user string identity as public key
Published 2015“…The proposed algorithm enables the algorithm to be applicable to all E-mail address domains, such as yahoo, gmail, edu, company, among others.In this study, two experiments were conducted. …”
Get full text
Get full text
Thesis -
2
HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation
Published 2021“…Consequently, a new meta-heuristic based t -way strategy called Hybrid Artificial Bee Colony (HABCSm) strategy, based on merging the advantages of the Artificial Bee Colony (ABC) algorithm with the advantages of a Particle Swarm Optimization (PSO) algorithm is proposed in this paper. …”
Get full text
Get full text
Article -
3
HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation
Published 2021“…Consequently, a new meta-heuristic based t -way strategy called Hybrid Artificial Bee Colony (HABCSm) strategy, based on merging the advantages of the Artificial Bee Colony (ABC) algorithm with the advantages of a Particle Swarm Optimization (PSO) algorithm is proposed in this paper. …”
Get full text
Get full text
Article -
4
-
5
Acoustic emission partial discharge localization in oil based on artificial bee colony
Published 2025“…This study explores the application of an artificial bee colony (ABC) to locate partial discharge (PD) in a test tank based on acoustic emission (AE) approach. …”
Get full text
Get full text
Get full text
Article -
6
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports -
7
Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm
Published 2010“…In this project, angles based control with Bees Optimization search algorithm were adopted to search with guidance the protein conformational space in order to find the optimum solution. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
10
An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP
Published 2021“…The Traveling Salesman Problem (TSP) is a combinatorial optimization problem that is useful in a number of applications. Since there is no known polynomial-time algorithm for solving large scale TSP, metaheuristic algorithms such as Ant Colony Optimization (ACO), Bee Colony Optimization (BCO), and Particle Swarm Optimization (PSO) have been widely used to solve TSP problems through their high quality solutions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…Some of the examples highlighted by [13] are a combinatorial optimisation, routing communications network, as well as solving robotics applications. According to [13], the two best-known swarm intelligence algorithms are Particle Swarm Optimisation (PSO) and Ant Colony Optimisation (ACO). …”
Get full text
Get full text
Monograph -
14
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
15
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
16
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
17
A study of watermarking methods in medical application
Published 2004Get full text
Get full text
Thesis -
18
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
19
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
20
ABC-PSO for vertical handover in heterogeneous wireless networks
Published 2017“…The ABC-PSO algorithm has been optimized to achieve small cost function that are powered using the IEEE 802.21 standard taking into account different available wireless networks, the application requirements and the user preferences to improve QoS. …”
Get full text
Get full text
Get full text
Get full text
Article
