Search Results - (( its application swarm algorithm ) OR ( _ application ((based algorithm) OR (rsa algorithm)) ))
Search alternatives:
- application swarm »
- swarm algorithm »
- rsa algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…The works related to swarm intelligence algorithms include the development of the algorithm itself, its modification and improvisation as well as its application in solving global optimisation problems. …”
Get full text
Get full text
Thesis -
3
Improved particle swarm optimization by fast annealing algorithm
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
5
-
6
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
7
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
8
-
9
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…Some of the examples highlighted by [13] are a combinatorial optimisation, routing communications network, as well as solving robotics applications. According to [13], the two best-known swarm intelligence algorithms are Particle Swarm Optimisation (PSO) and Ant Colony Optimisation (ACO). …”
Get full text
Get full text
Monograph -
10
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Swarm Intelligence Based Protein Conformational Search Algorithm.
Published 2007Get full text
Get full text
Conference or Workshop Item -
13
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…In addition, ISSA was compared with four well-known optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization, Grasshopper Optimization Algorithm, and Ant Lion Optimizer. …”
Get full text
Get full text
Article -
14
-
15
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
16
-
17
Application of Particle Swarm Optimization in Optimizing Stereo Matching Algorithm’s Parameters for Star Fruit Inspection System
Published 2014“…Based on this information, the particles will improve its position in the search space by moving towards its best record and the swarm best record. …”
Get full text
Get full text
Conference or Workshop Item -
18
Advances in Particle Swarm Algorithms in Asynchronous, Discrete and Multi-Objective Optimization
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
19
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
20
