Cryptography secures communication in banking, messaging, and blockchain. Good algorithms (AES, RSA, ECC, SHA-2/3, ChaCha20) are secure, efficient, and widely trusted. Bad algorithms (DES, MD5, SHA-1, ...
1 Department of Computer Science, Madurai Kamaraj University, Madurai, Tamil Nadu, India 2 P.G. Department of Computer Science, Government Arts and Science College, Madurai, Tamil Nadu, India ...
Abstract: An adaptive k-nearest neighbor algorithm (AdaNN) is brought forward in this paper to overcome the limitation of the traditional k-nearest neighbor algorithm (kNN) which usually identifies ...
This project demonstrates how to implement the K-Nearest Neighbors (KNN) algorithm for classification on a customer dataset. The program iterates through different values of k (number of neighbors) ...
This project detects spam messages in SMS, including those written in regional languages typed in English. It uses an extended SMS dataset and applies the Monte Carlo method with various supervised ...
Abstract: The increasing demands for seamless switching of high definition video streams have become the main driving force for the research of bitrate adaptive algorithms. Existing Q-learning based ...