Search Results - (( its application rsa algorithm ) OR ( based application ((bees algorithm) OR (_ algorithm)) ))
Search alternatives:
- based application »
- its application »
- application rsa »
- bees algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
-
3
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007“…The algorithm, which is a swarm-based algorithm inspired by the food foraging behavior of honey bees, was also employed to select the components making up the feature vectors to be presented to the SVM. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Optimal design of step – cone pulley problem using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Book Chapter -
6
-
7
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
8
Application of Bee Colony Optimization (BCO) in NP-Hard Problems
Published 2011Get full text
Get full text
Final Year Project -
9
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. …”
Get full text
Get full text
Research Reports -
10
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
11
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
12
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
Get full text
Get full text
Get full text
Article -
13
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
14
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
Get full text
Get full text
Thesis -
15
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
16
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
17
The Application of Artificial Bee Colony and Gravitational Search Algorithm in Reservoir Optimization
Published 2016“…ABC is an algorithm based on the foraging behaviour of bee while GSA imitates the gravitational processes. …”
Get full text
Get full text
Article -
18
Performance Enhancement Of Artificial Bee Colony Optimization Algorithm
Published 2013“…Artificial Bee Colony (ABC) algorithm is a recently proposed bio-inspired optimization algorithm, simulating foraging phenomenon of honeybees. …”
Get full text
Get full text
Thesis -
19
-
20
Local search manoeuvres recruitment in the bees algorithm
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item
