Search Results - (( some applications security algorithm ) OR ( based application learning algorithm ))*
Search alternatives:
- application learning »
- learning algorithm »
- some applications »
- based application »
-
1
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…For each algorithm, prior works have been identified, examined, and described based on their conceptual similarities. …”
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…AI algorithms rely on data or information to learn, analyze, and reach conclusions. …”
Get full text
Get full text
Get full text
Article -
5
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Nowadays more researchers use three type of approaches namely, Rule-base NER, Machine Learning-base NER and Hybrid NER to identify names. …”
Get full text
Get full text
Article -
6
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…AI algorithms rely on data or information to learn, analyze, and reach conclusions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
8
A real-time mobile notification system for inventory stock out detection using SIFT and RANSAC
Published 2020“…The proposed method is a machine learning based real-time notification system using the exciting Scale Invariant Feature Transform feature detector (SIFT) and Random Sample Consensus (RANSAC) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Paddy Plant (Oryza Sativa) Disease Detection Based On Improved Convolution Neural Network
Published 2023“…However, the applied algorithms of machine learning have some drawbacks in terms of time consuming, complex architecture, high computational cost, and the ability of the model to perform with more various types of paddy disease. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
-
11
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
A New Model for Trojan Detection using Machine Learning Inspired by Al-Furqan Verse
Published 2024“…Worse than that many game applications can be downloaded free from many websites and it might contain malicious file as well. …”
Article -
13
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
14
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
15
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
Artificial intelligence-driven vehicle fault diagnosis to revolutionize automotive maintenance: A review
Published 2024“…We focus on reviewing relevant literature in the field of machine learning as well as deep learning algorithms for fault diagnosis in engines, lifting systems (suspensions and tires), gearboxes, and brakes, among other vehicular subsystems. …”
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
20
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers
