-
1
Security testing and evaluation of cryptography algorithms. (c2003)
منشور في 2003احصل على النص الكامل
احصل على النص الكامل
masterThesis -
2
-
3
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …"
-
4
Unsupervised outlier detection in multidimensional data
منشور في 2022"…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. …"
-
5
-
6
Axes-Based Encryption Key
منشور في 2018احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
7
Scrambled Prime Key Encryption
منشور في 2018"…To enhance data security different cryptographic algorithms are used. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
8
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
احصل على النص الكامل
-
9
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
منشور في 2006"…Gamma pulses from a 3" Na(TI) scintillation detector were captured as single and double pulses for the purpose of testing the peak detection algorithms. The pulse classification technique was tested successfully on a TMS320C6000 high performance floating-point processor yielding a reduction of the execution time to 2 msec…"
احصل على النص الكامل
احصل على النص الكامل
article -
10
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
منشور في 2018"…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
11
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022الموضوعات: -
12
-
13
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
منشور في 2011"…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …"
احصل على النص الكامل
-
14
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…"
احصل على النص الكامل
احصل على النص الكامل
-
15
-
16
-
17
-
18
A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
19
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
-
20
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
منشور في 2022"…The proposed improved ABO method consists in reducing the number of samples in the training data set using the Euclidean distance and extracting the most significant features from the reduced data using ABO algorithm. …"