Zobrazeno 1 - 10
of 24
pro vyhledávání: '"K. M. Sunjiv Soyjaudah"'
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789813342989
There are several lightweight cryptographic ciphers (LWC) which have been proposed lately for constrained environments. When it comes to selecting one specific cipher for a particular application, the task becomes complicated. Several surveys have be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::880e67ad8c0cd366ccd123e945e48af1
https://doi.org/10.1007/978-981-33-4299-6_39
https://doi.org/10.1007/978-981-33-4299-6_39
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811333378
This work focuses on the application of Dolphin Swarm Algorithm (DSA) to cryptanalysis. It is a relatively new optimization algorithm that is based on the collective behavior of dolphins to hunt for food in their natural habitat. Experimental results
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5b595a87ff91c125cf9b655e087d6d35
https://doi.org/10.1007/978-981-13-3338-5_15
https://doi.org/10.1007/978-981-13-3338-5_15
Publikováno v:
2018 IEEE Conference on Systems, Process and Control (ICSPC).
In this paper, the machine learning algorithms have been applied on distinct features of Keystroke Dynamics. The Machine learning is important to correctly authenticate an individual. In this work, the complex models and algorithms help to determine
Autor:
Heman Mohabeer, K. M. Sunjiv Soyjaudah
Publikováno v:
International Journal of Computer Applications. 114:41-47
This paper presents promising results achieved by applying a new coding scheme based on predictive coding to neuroevolution. The technique proposed exploits the ability of a bit, which contains sufficient information, to represent its neighboring bit
Publikováno v:
ANTS
This research paper investigates the relevance of the Cat Swarm Optimization (CSO) algorithm to cryptanalysis. It is a relatively new evolutionary metaheuristic technique to solve those problems which belong to NP-hard class based on the swarm intell
Autor:
K. M. Sunjiv Soyjaudah, N. Manja Naik, A. Manjunatha, Rajashekarappa, Reshma Banu, B. D. Parameshachari
Publikováno v:
2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT).
This article presents an effective illustration structure for picture division in light of ability to interpret. In particular, another order of picture illustration by three steps is displayed. During base awake mode, structure changes depiction amo
Autor:
Rajashekarappa, Reshma Banu, A. C. Nuthan, K. M. Sunjiv Soyjaudah, Jithendra P. R. Nayak, B. D. Parameshachari
Publikováno v:
2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT).
The aim of this paper is to develop a more accurate PCB inspection system. In this method captured colored images are natural images i.e. without any precustomized environment and hence the every time the capture images varies with lighting condition
Publikováno v:
2017 3rd Iranian Conference on Intelligent Systems and Signal Processing (ICSPIS).
Keystroke dynamics, which distinguishes individual by its typing rhythm, is the most prevalent behavior biometrie authentication system. Neural Network is the active research area where different area has been presented. This paper present a keystrok
Autor:
K. M. Sunjiv Soyjaudah, V. K. Parvati, Reshma Banu, Shiny Rajendrakumar, Rajashekarappa, B. D. Parameshachari
Publikováno v:
2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT).
Today, the farmers are suffering from uncertain monsoons and water scarcity due to global warming. The integration of standard farming strategies with latest technologies as Internet of Things and Wireless device Networks may result in agricultural m
Publikováno v:
ISCBI
This paper present a keystroke dynamics Biometrie system using neural network as its classifier to recognize an individual. Biometric scheme are being widely used as their security merits over the earlier authentication system based on their history,