Search Results - (( based application ant algorithm ) OR ( _ application ((use algorithm) OR (rsa algorithm)) ))*
Search alternatives:
- based application »
- application ant »
- ant algorithm »
- use algorithm »
- rsa algorithm »
-
1
-
2
An adaptive ant colony optimization algorithm for rule-based classification
Published 2020“…Ant-Miner is a variant of ant colony optimisation and a prominent intelligent algorithm widely use in rules-based classification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
QoS based fair load-balancing: paradigm to IANRA routing algorithm for wireless networks (WNs)
Published 2008Get full text
Get full text
Conference or Workshop Item -
6
-
7
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
8
AntNet: a robust routing algorithm for data networks
Published 2004Get full text
Get full text
Get full text
Article -
9
Ant colony optimization in dynamic environments
Published 2010“…In order to achieve this objective, six ant algorithms namely Ant System (AS), Ant Colony System (ACS), Best-Worst Ant System (BWAS), Elitist Ant System (EAS), Max-Min Ant System (MMAS) and Rank-Based Ant System (RBAS) were implemented to solve a dynamic optimization problem in the form of the dynamic Traveling Salesman Problem (TSP). …”
Get full text
Get full text
Get full text
Thesis -
10
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
11
A new multiple ant colonies optimization algorithm utilizing average pheromone evaluation mechanism
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Ant colony optimization for rule induction with simulated annealing for terms selection
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
14
-
15
Heuristic factors in ant system algorithm for course timetabling problem
Published 2009Get full text
Get full text
Conference or Workshop Item -
16
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
18
-
19
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
20
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article
