Search Results - (( its application ((out algorithm) OR (bayes algorithm)) ) OR ( code application rsa algorithm ))*
Search alternatives:
- code application »
- its application »
- bayes algorithm »
- application rsa »
- out algorithm »
- rsa algorithm »
-
1
-
2
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
Get full text
Get full text
Student Project -
3
Implementation of RSA algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
4
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. …”
Get full text
Get full text
Thesis -
5
Support Vector Machines (SVM) in Test Extraction
Published 2006“…There exist numerous algorithms to address the need of text categorization including Naive Bayes, k-nearest-neighbor classifier, and decision trees. …”
Get full text
Get full text
Final Year Project -
6
Support Vector Machines (SVM) in Test Extraction
Published 2006“…There exist numerous algorithms to address the need of text categorization including Naive Bayes, k-nearest-neighbor classifier, and decision trees. …”
Get full text
Get full text
Final Year Project -
7
Analysing machine learning models to detect disaster events using social media
Published 2023text::Thesis -
8
Text Summarization System with Bayesian Theorem on Oil & Gas Drilling Topic
Published 2007“…In this project, Bayes theorem algorithm is studied and experimented by the implementation of a textual summarizer. …”
Get full text
Get full text
Final Year Project -
9
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
10
Sentiment analysis regarding marital issues using Naive Bayes algorithm / Farah Nabila Mohd Razali
Published 2025“…This study explores the application of sentiment analysis using the Naive Bayes algorithm to understand public perceptions of marital issues, particularly factors contributing to the rising divorce rate. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
14
Text classification using Naive Bayes: An experiment to conference paper
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Thesis -
16
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
17
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad...
Published 2023“…This project implements the Naive Bayes algorithm as the classification algorithm. …”
Get full text
Get full text
Book Section -
18
Performance comparison of classification algorithms for EEG-based remote epileptic seizure detection in wireless sensor networks
Published 2014“…Identification of epileptic seizure remotely by analyzing the electroencephalography (EEG) signal is very important for scalable sensor-based health systems.Classification is the most important technique for wide-ranging applications to categorize the items according to its features with respect to predefined set of classes.In this paper, we conduct a performance evaluation based on the noiseless and noisy EEG-based epileptic seizure data using various classification algorithms including BayesNet, DecisionTable, IBK, J48/C4.5, and VFI.The reconstructed and noisy EEG data are decomposed with discrete cosine transform into several sub-bands.In addition, some of statistical features are extracted from the wavelet coefficients to represent the whole EEG data inputs into the classifiers.Benchmark on widely used dataset is utilized for automatic epileptic seizure detection including both normal and epileptic EEG datasets.The classification accuracy results confirm that the selected classifiers have greater potentiality to identify the noisy epileptic disorders.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
Published 2022“…The best accuracy result shows 94.37% by the Decision Tree algorithm, and Naïve Bayes obtained the worst outcome at 66%.…”
Get full text
Get full text
Get full text
Article -
20
