Search Results - (( based application among algorithm ) OR ( _ application ((bees algorithm) OR (rsa algorithm)) ))
Search alternatives:
- based application »
- application among »
- among algorithm »
- bees algorithm »
- rsa algorithm »
-
1
Enhance key generation algorithm based user string identity as public key
Published 2015“…The proposed algorithm enables the algorithm to be applicable to all E-mail address domains, such as yahoo, gmail, edu, company, among others.In this study, two experiments were conducted. …”
Get full text
Get full text
Thesis -
2
HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation
Published 2021“…Consequently, a new meta-heuristic based t -way strategy called Hybrid Artificial Bee Colony (HABCSm) strategy, based on merging the advantages of the Artificial Bee Colony (ABC) algorithm with the advantages of a Particle Swarm Optimization (PSO) algorithm is proposed in this paper. …”
Get full text
Get full text
Article -
3
HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation
Published 2021“…Consequently, a new meta-heuristic based t -way strategy called Hybrid Artificial Bee Colony (HABCSm) strategy, based on merging the advantages of the Artificial Bee Colony (ABC) algorithm with the advantages of a Particle Swarm Optimization (PSO) algorithm is proposed in this paper. …”
Get full text
Get full text
Article -
4
-
5
Acoustic emission partial discharge localization in oil based on artificial bee colony
Published 2025“…This study explores the application of an artificial bee colony (ABC) to locate partial discharge (PD) in a test tank based on acoustic emission (AE) approach. …”
Get full text
Get full text
Get full text
Article -
6
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports -
7
Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm
Published 2010“…In this project, angles based control with Bees Optimization search algorithm were adopted to search with guidance the protein conformational space in order to find the optimum solution. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP
Published 2021“…The Traveling Salesman Problem (TSP) is a combinatorial optimization problem that is useful in a number of applications. Since there is no known polynomial-time algorithm for solving large scale TSP, metaheuristic algorithms such as Ant Colony Optimization (ACO), Bee Colony Optimization (BCO), and Particle Swarm Optimization (PSO) have been widely used to solve TSP problems through their high quality solutions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…Some of the examples highlighted by [13] are a combinatorial optimisation, routing communications network, as well as solving robotics applications. According to [13], the two best-known swarm intelligence algorithms are Particle Swarm Optimisation (PSO) and Ant Colony Optimisation (ACO). …”
Get full text
Get full text
Monograph -
12
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
A study of watermarking methods in medical application
Published 2004Get full text
Get full text
Thesis -
15
ABC-PSO for vertical handover in heterogeneous wireless networks
Published 2017“…The ABC-PSO algorithm has been optimized to achieve small cost function that are powered using the IEEE 802.21 standard taking into account different available wireless networks, the application requirements and the user preferences to improve QoS. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Application of nature-inspired algorithms and artificial intelligence for optimal efficiency of horizontal axis wind turbine / Md. Rasel Sarkar
Published 2019“…With this aim, a number of forecasting methods have been proposed in different studies till now, among many soft computing-based approaches are the most successful ones as they offer high accuracy as well as application simplicity. …”
Get full text
Get full text
Get full text
Thesis -
17
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
18
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
20
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter
