Search Results - (( binary classification mining algorithm ) OR ( program implementation rsa algorithm ))
Search alternatives:
- program implementation »
- binary classification »
- classification mining »
- implementation rsa »
- mining algorithm »
- rsa algorithm »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
3
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
4
-
5
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
6
An improved algorithm for iris classification by using support vector machine and binary random machine learning
Published 2018“…The first objective of this study is to improve a new algorithm technique for classification. The new algorithm come from a combination of an ideas of k-NN algorithm and ensemble concept. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO
Published 2014“…The proposed method is applied to 14 real world dataset from the machine learning repository. The algorithm’s performance is illustrated by the corresponding table of the classification rate. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
Get full text
Get full text
Final Year Project -
11
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
12
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
13
Logic mining method via hybrid discrete hopfield neural network
Published 2025“…Despite the success, the limitations of existing logic mining methods are often overlooked, hindering the search for optimal solutions in binary classification tasks. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…The design of our method is a kind of One-Against-All multi classification technique to solve the traditional binary classifier in SVM.…”
Get full text
Get full text
Article -
16
-
17
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
18
Enhancement of new smooth support vector machines for classification problems
Published 2011“…Research on Smooth Support Vector Machine (SSVM) for classification problem is an active field in data mining. …”
Get full text
Get full text
Thesis -
19
Overview of biomedical relations extraction using hybrid rule-based approaches.
Published 2013“…These huge amounts of information cause very difficult task of extraction or classification.Therefore, there is a need for knowledge discovery and text mining tools in this field. …”
Get full text
Get full text
Get full text
Article -
20
Multitasking deep neural network models for Arabic dialect sentiment analysis
Published 2022“…Therefore, a model called Multi-Tasking Learning based on Convolutional Hierarchical Attention Neural Network (MTL-CHAN) is proposed, comprising of (i) shared word encoder and word attention networks across classification tasks, (ii) task-specific layers with convolutional neural network-based attention (CNNA) on sentence-level; to handle the Arabic explicit negation words and improve the classification performance by training Arabic classification tasks (binary, ternary, and five) jointly. …”
Get full text
Get full text
Thesis
