Search Results - (( its applications rsa algorithm ) OR ( _ application ((bee algorithm) OR (new algorithm)) ))
Search alternatives:
- its applications »
- applications rsa »
- rsa algorithm »
- bee algorithm »
- new algorithm »
-
1
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007“…This paper describes a new application of the Bees Algorithm to the optimization of a Support Vector Machine (SVM) for the problem of classifying defects in plywood. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
3
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
4
-
5
Application of Bee Colony Optimization (BCO) in NP-Hard Problems
Published 2011Get full text
Get full text
Final Year Project -
6
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
7
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
8
-
9
Performance Enhancement Of Artificial Bee Colony Optimization Algorithm
Published 2013“…Artificial Bee Colony (ABC) algorithm is a recently proposed bio-inspired optimization algorithm, simulating foraging phenomenon of honeybees. …”
Get full text
Get full text
Thesis -
10
-
11
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
12
Development Of Artificial Bee Colony (Abc) Variants And Memetic Optimization Algorithms
Published 2017“…One of BIAs, artificial bee colony (ABC) optimization algorithm, has shown excellent performance in many applications compared to other optimization algorithms. …”
Get full text
Get full text
Thesis -
13
-
14
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
15
HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation
Published 2021“…Consequently, a new meta-heuristic based t -way strategy called Hybrid Artificial Bee Colony (HABCSm) strategy, based on merging the advantages of the Artificial Bee Colony (ABC) algorithm with the advantages of a Particle Swarm Optimization (PSO) algorithm is proposed in this paper. …”
Get full text
Get full text
Article -
16
HABCSm: A Hamming Based t -way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation
Published 2021“…Consequently, a new meta-heuristic based t -way strategy called Hybrid Artificial Bee Colony (HABCSm) strategy, based on merging the advantages of the Artificial Bee Colony (ABC) algorithm with the advantages of a Particle Swarm Optimization (PSO) algorithm is proposed in this paper. …”
Get full text
Get full text
Article -
17
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Hydroclimatic data prediction using a new ensemble group method of data handling coupled with artificial bee colony algorithm
Published 2022“…It is rare to find a hydrological application using the group method of data handling (GMDH) model, artificial bee colony (ABC) algorithm, and ensemble technique, precisely predicting ungauged sites. …”
Get full text
Get full text
Get full text
Article -
19
Test Data Generation for Event Driven System Using Bees Algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
20
Honey bee based trust management system for cloud computing
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item
