Search Results - (( its application ((based algorithm) OR (rsa algorithm)) ) OR ( _ application search algorithm ))
Search alternatives:
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Comprehensive review of the development of the harmony search algorithm and its applications
Published 2019“…This paper presents a comprehensive overview of the development of the harmony search (HS) algorithm and its applications. HS is a well-known human-based meta-heuristic algorithm that mimics the process of creating a new harmony in music. …”
Get full text
Get full text
Get full text
Article -
3
-
4
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…In this study, we are looking at the performance of four graph-based path planning algorithms which is Breadth First Search, Depth First Search, Dijkstra and A*, when implemented in real world applications. …”
Get full text
Get full text
Final Year Project -
5
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016Get full text
Get full text
Final Year Project -
6
-
7
-
8
-
9
A harmony search algorithm for university course timetabli
Published 2012Get full text
Get full text
Get full text
Article -
10
A Multi-State Gravitational Search Algorithm for Combinatorial Optimization Problems
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Opposition-based spiral dynamic algorithm with an application to optimize type-2 fuzzy control for an inverted pendulum system
Published 2022“…This paper presents two variants of the Opposition-based Spiral Dynamic Algorithm (ObSDA) for an application to optimize a type-2 fuzzy logic controller for an inverted pendulum system. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
-
15
-
16
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
17
-
18
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…To show the applicability of the basic UTMGO, we extend its structure to develop a Gene Ontology -based protein sequence annotation tool named extended UTMGO. …”
Get full text
Get full text
Get full text
Article -
19
A hybrid local search algorithm for minimum dominating set problems
Published 2022“…For the second stage, we propose a gain-based deterministic local search algorithm as an exploitation procedure. …”
Get full text
Get full text
Article -
20
A hybrid local search algorithm for minimum dominating set problems
Published 2022“…For the second stage, we propose a gain-based deterministic local search algorithm as an exploitation procedure. …”
Get full text
Get full text
Article
