Search Results - (( its application learning algorithm ) OR ( some applications security algorithm ))*
Search alternatives:
- application learning »
- learning algorithm »
- some applications »
- its application »
-
1
-
2
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
Get full text
Get full text
Article -
3
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
4
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
6
Artificial intelligence-driven vehicle fault diagnosis to revolutionize automotive maintenance: A review
Published 2024“…We focus on reviewing relevant literature in the field of machine learning as well as deep learning algorithms for fault diagnosis in engines, lifting systems (suspensions and tires), gearboxes, and brakes, among other vehicular subsystems. …”
Get full text
Get full text
Get full text
Article -
7
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
8
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
9
-
10
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
11
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
12
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
13
On the security of digital signature protocol based on iterated function systems.
Published 2011“…The proposed algorithm possesses sufficient security against some known attacks applicable on finite field cryptosystems. …”
Get full text
Get full text
Get full text
Article -
14
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An overview of video encryption techniques
Published 2010Get full text
Get full text
Get full text
Article -
16
HISEC: a new lightweight block cipher algorithm
Published 2014“…Lightweight block cipher algorithms are vital for constrained environment. There are many applications need secured lightweight block cipher algorithm like credit card, E-passport and etc. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
Comparative study of some symmetric ciphers in mobile systems
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
20
