Search Results - (( based application among algorithm ) OR ( _ application ((bees algorithm) OR (rsa algorithm)) ))

Refine Results
  1. 1

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…The proposed algorithm enables the algorithm to be applicable to all E-mail address domains, such as yahoo, gmail, edu, company, among others.In this study, two experiments were conducted. …”
    Get full text
    Get full text
    Thesis
  2. 2

    HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation by Alazzawi, A.K., Rais, H.M., Basri, S., Alsariera, Y.A., Capretz, L.F., Imam, A.A., Balogun, A.O.

    Published 2021
    “…Consequently, a new meta-heuristic based t -way strategy called Hybrid Artificial Bee Colony (HABCSm) strategy, based on merging the advantages of the Artificial Bee Colony (ABC) algorithm with the advantages of a Particle Swarm Optimization (PSO) algorithm is proposed in this paper. …”
    Get full text
    Get full text
    Article
  3. 3

    HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation by Alazzawi, A.K., Rais, H.M., Basri, S., Alsariera, Y.A., Capretz, L.F., Imam, A.A., Balogun, A.O.

    Published 2021
    “…Consequently, a new meta-heuristic based t -way strategy called Hybrid Artificial Bee Colony (HABCSm) strategy, based on merging the advantages of the Artificial Bee Colony (ABC) algorithm with the advantages of a Particle Swarm Optimization (PSO) algorithm is proposed in this paper. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Acoustic emission partial discharge localization in oil based on artificial bee colony by Lim, Zhi Yang, Azis, Norhafiz, Mohd Hashim, Ahmad Hafiz, Mohd Radzi, Mohd Amran, Norsahperi, Nor Mohd Haziq, Mohd Ariffin, Azrul

    Published 2025
    “…This study explores the application of an artificial bee colony (ABC) to locate partial discharge (PD) in a test tank based on acoustic emission (AE) approach. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
    Get full text
    Get full text
    Research Reports
  7. 7

    Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm by Al-Qattan, Zakaria Noor Aldeen Mahmood

    Published 2010
    “…In this project, angles based control with Bees Optimization search algorithm were adopted to search with guidance the protein conformational space in order to find the optimum solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP by Bibi Aamirah Shafaa Emambocus, Muhammed Basheer Jasser, Muzaffar Hamzah, Aida Mustapha, Angela Amphawan

    Published 2021
    “…The Traveling Salesman Problem (TSP) is a combinatorial optimization problem that is useful in a number of applications. Since there is no known polynomial-time algorithm for solving large scale TSP, metaheuristic algorithms such as Ant Colony Optimization (ACO), Bee Colony Optimization (BCO), and Particle Swarm Optimization (PSO) have been widely used to solve TSP problems through their high quality solutions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots by Ismail, Amelia Ritahani, Tumian, Afidalina

    Published 2019
    “…Some of the examples highlighted by [13] are a combinatorial optimisation, routing communications network, as well as solving robotics applications. According to [13], the two best-known swarm intelligence algorithms are Particle Swarm Optimisation (PSO) and Ant Colony Optimisation (ACO). …”
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    ABC-PSO for vertical handover in heterogeneous wireless networks by Goudarzi, Shidrokh, Hassan, Wan Haslina, Anisi, Mohammad Hossein, Soleymani, Seyed Ahmad, Sookhak, Mehdi, Khan, Muhammad Khurram, Hassan Abdalla Hashim, Aisha, Zareei, Mahdi

    Published 2017
    “…The ABC-PSO algorithm has been optimized to achieve small cost function that are powered using the IEEE 802.21 standard taking into account different available wireless networks, the application requirements and the user preferences to improve QoS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Application of nature-inspired algorithms and artificial intelligence for optimal efficiency of horizontal axis wind turbine / Md. Rasel Sarkar by Md. Rasel, Sarkar

    Published 2019
    “…With this aim, a number of forecasting methods have been proposed in different studies till now, among many soft computing-based approaches are the most successful ones as they offer high accuracy as well as application simplicity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20