Search
Now showing items 1-9 of 9
Neural network model using back-propagation algorithm with momentum term for credit risk evaluation system
(The SCIence and Engineering Institute (SCIEI), 2016)
This paper present the results of an experiment made with the aid of KangarooBPNN, a graphical user interface software in order to find the Mean Squared Error (MSE) of a supervised neural network model. In the previous ...
A modified Otsu-based image segmentation algorithm (OBISA)
(Newswood Limited, 2019-03-13)
Image thresholding is usually a preprocessing step in a number of image processing algorithms. The segmented images are input for image analyses, computer vision, and visualizations and object representation. Otsu thresholding ...
Hierarchical clustering and association rule discovery process for efficient decision support system
(Springer-Verlag Berlin Heidelberg, 2011)
This paper proposed a model based on hierarchical Clustering and Association Rule, which is intended for decision support system. The proposed system is intended to address the shortcomings of other data mining tools on ...
Decision support system for agricultural management using prediction algorithm
(Institute of Electrical and Electronics Engineers Inc., 2013-09-26)
Currently climate change is one of the major problems encountered due to the climatic controls interacting in various intensities and in different combinations. The proposed system includes mechanism that accepts/processes ...
The performance of Blum-Blum-Shub elliptic curve pseudorandom number generator as WiFi protected access 2 security key generator
(Association for Computing Machinery, 2018-09-20)
WiFi Protected Access 2 (WPA2) is considered the most secure network security protocol in wireless routers, despite the discovery of partial key exposure vulnerability. In light of, an experiment was conducted to investigate ...
Analysis of key randomness in improved one-time pad cryptography
(IEEE Computer Society, 2019-12-09)
In cryptography, one-time pad (OTP) is claimed to be the perfect secrecy algorithm in several works if all of its features are applied correctly. Its secrecy depends mostly on random keys, which must be truly random and ...
A modified approach of blowfish algorithm based on S-box permutation using shuffle algorithm
(Association for Computing Machinery, 2018-12-14)
Blowfish Algorithm has been widely analyzed and gradually accepted as a good and powerful cryptographic algorithm offering several advantages among which is suitability and efficiency for implementing hardware and software; ...
Using a modified approach of blowfish algorithm for data security in cloud computing
(Association for Computing Machinery, 2018-12-29)
Cloud computing brought remarkable potential changes and excellent opportunities to the information technology industry. It is particularly useful in most of the networked transactions. Cloud computing common issue problems ...
A sustainability framework of river-based tourism in Panay Island
(Taylor’s University Sdn Bhd, 2019)
This study aimed to determine the impacts of river-based tourism destinations sustainability of Panay Island in terms of economic viability, socio-cultural equity, and environmental conservation. The study used a quantitative ...