Search Results - (( its applications _ algorithm ) OR ( its application ((bee algorithm) OR (rsa algorithm)) ))*
Search alternatives:
- its applications »
- its application »
- bee algorithm »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The receiver of the encrypted text uses a "key" to decrypt the message, returning it to its original plain text form. The key is the trigger mechanism to the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
5
-
6
-
7
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
8
Bees algorithm for Forest transportation planning optimization in Malaysia
Published 2021“…Algorithm is widely used in various areas due to its ability to solve classes of problems. …”
Get full text
Get full text
Article -
9
Optimal design of step – cone pulley problem using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Book Chapter -
10
Protein Conformantional Search Using Bees Algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Optimisation of Surface Roughness in 3D Printing Using the Bees Algorithm
Published 2025Get full text
Get full text
Get full text
Get full text
Book Chapter -
12
Artificial Bee Colony Algorithm for Pairwise Test Generation
Published 2017“…PABC progresses as a means to achieve the effective use of the artificial bee colony algorithm for pairwise testing reduction.…”
Get full text
Get full text
Get full text
Article -
13
-
14
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
Get full text
Get full text
Thesis -
15
Performance Enhancement Of Artificial Bee Colony Optimization Algorithm
Published 2013“…Artificial Bee Colony (ABC) algorithm is a recently proposed bio-inspired optimization algorithm, simulating foraging phenomenon of honeybees. …”
Get full text
Get full text
Thesis -
16
Experiment on modified artificial bee colony for better global optimisation
Published 2014Get full text
Get full text
Book Section -
17
HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation
Published 2021“…HABCSm is the first t -way strategy to adopt Hybrid Artificial Bee Colony (HABC) algorithm with Hamming distance as its core method for generating a final test set and the first to adopt the Hamming distance as the final selection criterion for enhancing the exploration of new solutions. …”
Get full text
Get full text
Article -
18
HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation
Published 2021“…HABCSm is the first t -way strategy to adopt Hybrid Artificial Bee Colony (HABC) algorithm with Hamming distance as its core method for generating a final test set and the first to adopt the Hamming distance as the final selection criterion for enhancing the exploration of new solutions. …”
Get full text
Get full text
Article -
19
Local search manoeuvres recruitment in the bees algorithm
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
20
On (unknowingly) using near-square RSA primes
Published 2022“…Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. …”
Get full text
Get full text
Article
