Search Results - (( java application rsa algorithm ) OR ( data selection ((bees algorithm) OR (path algorithm)) ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Application of the bees algorithm to the selection features for manufacturing data by Pham, D.T, Mahmuddin, Massudi, Otri, S., Al-Jabbouli, H.

    Published 2007
    “…The Bees Algorithm is employed to select an optimal set of features for a particular pattern classification task. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Using the bees algorithm to optimise a support vector machine for wood defect classification by Pham, D.T, Muhammad, Zaidi, Mahmuddin, Massudi, Ghanbarzadeh, Afshin, Koc, Ebubekir, Otri, Sameh

    Published 2007
    “…The algorithm, which is a swarm-based algorithm inspired by the food foraging behavior of honey bees, was also employed to select the components making up the feature vectors to be presented to the SVM. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification by Hijazi, Musab, Zeki, Akram M., Ismail, Amelia Ritahani

    Published 2023
    “…One of the widely used algorithms for feature selection in text classification is the Evolutionary algorithm . …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Automated path testing using the negative selection algorithm by Shayma Mustafa Mohi-Aldeen, Radziah Mohamad, Safaai Deris

    Published 2017
    “…Negative selection algorithm (NSA) has been used in this paper to generate test data for path testing automatically. …”
    Get full text
    Get full text
    Indexed Article
  10. 10
  11. 11

    Optimising a waste management system using the Artificial Bee Colony (ABC) algorithm by Mohamad Fadzil, Nur Hamisha Helanie

    Published 2025
    “…Future work may focus on integrating real-time data, adjusting algorithm parameters and hybridizing ABC algorithm with other metaheuristics to further improve performance.…”
    Get full text
    Get full text
    Student Project
  12. 12
  13. 13

    An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network by Wan Isni Sofiah, Wan Din, Asyran Zarizi, Abdullah, Razulaimi, Razali, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Eh Phon, Danakorn Nincarean, Cik Feresa, Mohd Foozy

    Published 2019
    “…When this happens, the sensor node cannot receive and send the data until the energy is renewed. To reduce WSN energy consumption, the process of selecting a path to the destination is very important. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Such an in-band probing algorithm reduces measurement overhead on the selected overlay path. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics by Mohammad Jarrah, Mu'ath Ibrahim

    Published 2018
    “…Optimization is a crucial process to select the best parameters in single and multi-objective problems for manufacturing process.However,it is difficult to find an optimization algorithm that obtain the global optimum for every optimization problem.Artificial Bees Colony (ABC) is a well-known swarm intelligence algorithm in solving optimization problems.It has noticeably shown better performance compared to the state-of-art algorithms.This study proposes a novel hybrid ABC algorithm with β-Hill Climbing (βHC) technique (ABC-βHC) in order to enhance the exploitation and exploration process of the ABC in optimizing carbon nanotubes (CNTs) characteristics.CNTs are widely used in electronic and mechanical products due to its fascinating material with extraordinary mechanical,thermal,physical and electrical properties. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria by Ting, Kien Hua, Noraini Abdullah

    Published 2018
    “…Dijkstra’s Algorithm is a shortest path algorithm that considers a single criterion only. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    LSSVM parameters tuning with enhanced artificial bee colony by Mustaffa, Zuriani, Yusof, Yuhanis

    Published 2014
    “…The proposed model was employed in predicting financial time series data and comparison is made against the standard Artificial Bee Colony (ABC) and Cross Validation (CV) technique.The simulation results assured the accuracy of parameter selection, thus proved the validity in improving the prediction accuracy with acceptable computational time.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20