Search Results - (( its application rsa algorithm ) OR ( _ application ((ant algorithm) OR (graph algorithm)) ))
Search alternatives:
- application rsa »
- graph algorithm »
- rsa algorithm »
- ant algorithm »
-
1
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
2
-
3
Heuristic factors in ant system algorithm for course timetabling problem
Published 2009Get full text
Get full text
Conference or Workshop Item -
4
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
5
-
6
-
7
Path Optimization For Cooperative Multi-Head 3d Printing
Published 2020Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
Aco-based feature selection algorithm for classification
Published 2022“…An enhanced graph clustering ant colony optimisation (EGCACO) algorithm is proposed to solve the three (3) MGCACO algorithm problems. …”
Get full text
Get full text
Thesis -
10
Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification
Published 2023“…However, the FGCDR produced a substantial amount of redundant and insignificant features. The ant colony optimisation (ACO) algorithm have been used to select feature subset. …”
Get full text
Get full text
Get full text
Thesis -
11
African Buffalo Optimization (ABO): A New Metaheuristic Algorithm
Published 2015Get full text
Get full text
Get full text
Article -
12
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Benchmark simulator with dynamic environment for job scheduling in grid computing
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Design and statistical analysis of initial solution construction approach in curriculum based course timetabling problem
Published 2017Get full text
Get full text
Conference or Workshop Item -
16
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
18
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
19
-
20
Partial key attack given MSBs of CRT-RSA private keys
Published 2020“…The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. …”
Get full text
Get full text
Article
