Search
Now showing items 1-7 of 7
Neural network model using back-propagation algorithm with momentum term for credit risk evaluation system
(The SCIence and Engineering Institute (SCIEI), 2016)
This paper present the results of an experiment made with the aid of KangarooBPNN, a graphical user interface software in order to find the Mean Squared Error (MSE) of a supervised neural network model. In the previous ...
A modified Otsu-based image segmentation algorithm (OBISA)
(Newswood Limited, 2019-03-13)
Image thresholding is usually a preprocessing step in a number of image processing algorithms. The segmented images are input for image analyses, computer vision, and visualizations and object representation. Otsu thresholding ...
Hierarchical clustering and association rule discovery process for efficient decision support system
(Springer-Verlag Berlin Heidelberg, 2011)
This paper proposed a model based on hierarchical Clustering and Association Rule, which is intended for decision support system. The proposed system is intended to address the shortcomings of other data mining tools on ...
The performance of Blum-Blum-Shub elliptic curve pseudorandom number generator as WiFi protected access 2 security key generator
(Association for Computing Machinery, 2018-09-20)
WiFi Protected Access 2 (WPA2) is considered the most secure network security protocol in wireless routers, despite the discovery of partial key exposure vulnerability. In light of, an experiment was conducted to investigate ...
Analysis of key randomness in improved one-time pad cryptography
(IEEE Computer Society, 2019-12-09)
In cryptography, one-time pad (OTP) is claimed to be the perfect secrecy algorithm in several works if all of its features are applied correctly. Its secrecy depends mostly on random keys, which must be truly random and ...
Using a modified approach of blowfish algorithm for data security in cloud computing
(Association for Computing Machinery, 2018-12-29)
Cloud computing brought remarkable potential changes and excellent opportunities to the information technology industry. It is particularly useful in most of the networked transactions. Cloud computing common issue problems ...
Relocating local outliers produced by K-means and K-medoids using local outlier rectifier V. 2.0
(Institute of Electrical and Electronics Engineers Inc., 2020-02-06)
The extensive growth in the field of information and communication technology allows easy capture of massive amounts of valuable data in different areas. These data are used in various data mining techniques. However, in ...