Search Results - (( based application use algorithm ) OR ( its application ((bees algorithm) OR (rsa algorithm)) ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhanced artificial bee colony-least squares support vector machines algorithm for time series prediction by Zuriani, Mustaffa

    Published 2014
    “…This study proposed a hybrid algorithm, based on Artificial Bee Colony (ABC) and LSSVM, that consists of three algorithms; ABC-LSSVM, lvABC-LSSVM and cmABC-LSSVM. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets by Mohd Razali, Muhamad Hasbullah, Saian, Rizauddin, Yap, Bee Wah, Ku-Mahamud, Ku Ruhana

    Published 2021
    “…This study proposed an enhanced algorithm called hellingerant-tree-miner (HATM) which is inspired by ant colony optimization (ACO) metaheuristic for imbalanced learning using decision tree classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Acoustic emission partial discharge localization in oil based on artificial bee colony by Lim, Zhi Yang, Azis, Norhafiz, Mohd Hashim, Ahmad Hafiz, Mohd Radzi, Mohd Amran, Norsahperi, Nor Mohd Haziq, Mohd Ariffin, Azrul

    Published 2025
    “…This study explores the application of an artificial bee colony (ABC) to locate partial discharge (PD) in a test tank based on acoustic emission (AE) approach. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm by Al-Qattan, Zakaria Noor Aldeen Mahmood

    Published 2010
    “…In this project, angles based control with Bees Optimization search algorithm were adopted to search with guidance the protein conformational space in order to find the optimum solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    A review of training methods of ANFIS for applications in business and economic by Mohd Salleh, Mohd Najib, Hussain, Kashif

    Published 2016
    “…Therefore many researchers have trained ANFIS parameters using metaheuristic algorithms however very few have considered optimizing the ANFIS rule-base. …”
    Get full text
    Get full text
    Article