Search Results - (( based application system algorithm ) OR ( _ application ((bees algorithm) OR (rsa algorithm)) ))

Refine Results
  1. 1
  2. 2
  3. 3

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Using the bees algorithm to optimise a support vector machine for wood defect classification by Pham, D.T, Muhammad, Zaidi, Mahmuddin, Massudi, Ghanbarzadeh, Afshin, Koc, Ebubekir, Otri, Sameh

    Published 2007
    “…This paper describes a new application of the Bees Algorithm to the optimization of a Support Vector Machine (SVM) for the problem of classifying defects in plywood. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony by Mohd Izuddin Sipluk

    Published 2022
    “…During the methodology chapter, a comprehensive investigation has been done to ascertain the proposed method that can be adopted such as algorithms involved, project flow, and simulation. This is essential to produce a system that has a feature such as web-based system that is able to generate a report from the simulation. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  13. 13

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…In this paper, a development of low-cost RSA-based Crypto Embedded System targeted for electronic document security is presented. …”
    Get full text
    Get full text
    Article
  14. 14

    Surface roughness optimization based on hybrid harmony search and artificial bee colony algorithm in electric discharge machining process by Deris A.M., Solemon B.

    Published 2023
    “…Electric discharges; Optimal systems; Optimization; Surface roughness; Artificial bee colonies (ABC); Artificial bee colony algorithms; Convergence rates; Electric discharge machining (EDM); Hybrid approach; Numerical applications; Optimal solutions; Surface roughness (Ra); Electric discharge machining…”
    Conference Paper
  15. 15
  16. 16
  17. 17
  18. 18

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
    Get full text
    Get full text
    Thesis
  19. 19

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20