Search Results - (( based application system algorithm ) OR ( _ application ((bees algorithm) OR (rsa algorithm)) ))
Search alternatives:
- based application »
- system algorithm »
- bees algorithm »
- rsa algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
6
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
7
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007“…This paper describes a new application of the Bees Algorithm to the optimization of a Support Vector Machine (SVM) for the problem of classifying defects in plywood. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Application of Bee Colony Optimization (BCO) in NP-Hard Problems
Published 2011Get full text
Get full text
Final Year Project -
9
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
10
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
Get full text
Get full text
Thesis -
11
Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony
Published 2022“…During the methodology chapter, a comprehensive investigation has been done to ascertain the proposed method that can be adopted such as algorithms involved, project flow, and simulation. This is essential to produce a system that has a feature such as web-based system that is able to generate a report from the simulation. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
13
Crypto Embedded System for Electronic Document
Published 2006“…In this paper, a development of low-cost RSA-based Crypto Embedded System targeted for electronic document security is presented. …”
Get full text
Get full text
Article -
14
Surface roughness optimization based on hybrid harmony search and artificial bee colony algorithm in electric discharge machining process
Published 2023“…Electric discharges; Optimal systems; Optimization; Surface roughness; Artificial bee colonies (ABC); Artificial bee colony algorithms; Convergence rates; Electric discharge machining (EDM); Hybrid approach; Numerical applications; Optimal solutions; Surface roughness (Ra); Electric discharge machining…”
Conference Paper -
15
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
16
-
17
-
18
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
19
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
20
Honey bee based trust management system for cloud computing
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item
