Search Results - (( its application ((acs algorithm) OR (ant algorithm)) ) OR ( its application rsa algorithm ))*
Search alternatives:
- its application »
- application rsa »
- acs algorithm »
- ant algorithm »
- rsa algorithm »
-
1
Embedding Malaysian House Red Ant Behavior into an Ant Colony System
Published 2008Get full text
Get full text
Citation Index Journal -
2
Improved Dynamic Ant Colony System (DACS) on Symmetric Traveling Salesman Problem (TSP).
Published 2007Get full text
Get full text
Conference or Workshop Item -
3
Strategies DACS3 Increasing its Performances
Published 2009Get full text
Get full text
Citation Index Journal -
4
Applying DACS3 in the Capacitated Vehicle Routing Problem
Published 2010Get full text
Get full text
Conference or Workshop Item -
5
Modified ACS centroid memory for data clustering
Published 2019“…Ant Colony Optimization (ACO) is a generic algorithm, which has been widely used in different application domains due to its simplicity and adaptiveness to different optimization problems. …”
Get full text
Get full text
Get full text
Article -
6
-
7
An improved ACS algorithm for data clustering
Published 2020Get full text
Get full text
Get full text
Article -
8
Suitability Factor on the Capacitated Vehicle Routing Problem
Published 2010Get full text
Get full text
Conference or Workshop Item -
9
-
10
-
11
-
12
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
16
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
17
-
18
-
19
-
20
Rule pruning techniques in the ant-miner classification algorithm and its variants: A review
Published 2018“…Rule-based classification is considered an important task of data classification.The ant-mining rule-based classification algorithm, inspired from the ant colony optimization algorithm, shows a comparable performance and outperforms in some application domains to the existing methods in the literature.One problem that often arises in any rule-based classification is the overfitting problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
