Search Results - (( some applications security algorithm ) OR ( based application learning algorithm ))*

Refine Results
  1. 1

    Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system by Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Mubarak, Sinil

    Published 2022
    “…For each algorithm, prior works have been identified, examined, and described based on their conceptual similarities. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Nowadays more researchers use three type of approaches namely, Rule-base NER, Machine Learning-base NER and Hybrid NER to identify names. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A real-time mobile notification system for inventory stock out detection using SIFT and RANSAC by Merrad, Yacine, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Gunawan, Teddy Surya

    Published 2020
    “…The proposed method is a machine learning based real-time notification system using the exciting Scale Invariant Feature Transform feature detector (SIFT) and Random Sample Consensus (RANSAC) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Paddy Plant (Oryza Sativa) Disease Detection Based On Improved Convolution Neural Network by Marceila Suzie, Ambrose

    Published 2023
    “…However, the applied algorithms of machine learning have some drawbacks in terms of time consuming, complex architecture, high computational cost, and the ability of the model to perform with more various types of paddy disease. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10
  11. 11

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A New Model for Trojan Detection using Machine Learning Inspired by Al-Furqan Verse by Madihah Mohd Saudi, Areej Mustafa Abuzaid, Masrur Ibrahim

    Published 2024
    “…Worse than that many game applications can be downloaded free from many websites and it might contain malicious file as well. …”
    Article
  13. 13
  14. 14

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16

    Artificial intelligence-driven vehicle fault diagnosis to revolutionize automotive maintenance: A review by Hossain, Md Naeem, Rahman, Md Mustafizur, D., Ramasamy

    Published 2024
    “…We focus on reviewing relevant literature in the field of machine learning as well as deep learning algorithms for fault diagnosis in engines, lifting systems (suspensions and tires), gearboxes, and brakes, among other vehicular subsystems. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20