Search Results - (( java pattern classification algorithm ) OR ( using interaction encryption algorithm ))
Search alternatives:
- pattern classification »
- interaction encryption »
- using interaction »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
3
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
5
Secure block cipher inspired by the human immune system
Published 2012“…In computer security service, cryptographic algorithm is used to ensure adequate security of the systems or of data transfers. …”
Get full text
Get full text
Thesis -
6
Proposed method for enhancing quantum bit error rate using quantum key distribution technique
Published 2014“…The main issue is, the public key algorithm suffers no effective solutions which are natural within particular integer factorization, distinct logarithm and also elliptic curve interactions. …”
Get full text
Get full text
Conference or Workshop Item -
7
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…In particular, important issues such as how smartcard applications can be modeled using UML techniques and how UML can be used to sketch the operations for implementing a secure access using smartcard has been addressed.…”
Get full text
Get full text
Thesis
