Results for 'Homomorphic encryption'

37 found
Order:
  1. Ambiguous encryption implies that consciousness cannot be simulated.Anna Wegloop & Peter Vach - manuscript
    Here we show, based on a simplified version of fully homomorphic encryption, that it is not possible to simulate conscious experience, in the sense of using a computer algorithm to generate experiences that are indistinguishable from those of a particular typical human being. This seems to have important implications for questions in the context of future developments in artificial intelligence. For example, the proposed process of mind-uploading will in general not generate a virtual consciousness similar to the consciousness (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  33
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  38
    Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  33
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  35
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  30
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re- (...) keys are only issued to legitimate users. An in depth analysis shows that our scheme is secure, flexible and efficient for mobile cloud computing. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a large-scale cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  37
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. A Review on Biometric Encryption System in Cloud Computing.Xiufeng Liu, Sheraz Arshad, Nosheen Nazir, Mubeen Fatima & Mahreen Mahi - 2018 - International Journal of Computer Science and Network Solutions 6 (1).
    This Review paper is about the security of bio metric templates in cloud databases. Biometrics is proved to be the best authentication method. However, the main concern is the security of the biometric template, the process to extract and stored in the database within the same database along with many other. Many techniques and methods have already been proposed to secure templates, but everything comes with its pros and cons, this paper provides a critical overview of these issues and solutions.
    Download  
     
    Export citation  
     
    Bookmark  
  11.  24
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  33
    Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  13.  31
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  21
    Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  41
    Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  16.  67
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  57
    Advanced Attribute-Based Keyword Search for Secure Cloud Data Storage Solutions.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-360.
    This paper delves into the integration of optimization techniques within ABKS to enhance search efficiency and data security in cloud storage environments. We explore various optimization strategies, such as index compression, query processing enhancement, and encryption optimization, which aim to reduce computational overhead while maintaining robust security measures. Through a comprehensive analysis, the paper illustrates how these techniques can significantly improve the performance of cloud storage systems, ensuring both security and usability. Experimental results demonstrate that optimized ABKS not only (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  21
    Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for predictive search (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Gödel Mathematics Versus Hilbert Mathematics. II Logicism and Hilbert Mathematics, the Identification of Logic and Set Theory, and Gödel’s 'Completeness Paper' (1930).Vasil Penchev - 2023 - Logic and Philosophy of Mathematics eJournal (Elsevier: SSRN) 15 (1):1-61.
    The previous Part I of the paper discusses the option of the Gödel incompleteness statement (1931: whether “Satz VI” or “Satz X”) to be an axiom due to the pair of the axiom of induction in arithmetic and the axiom of infinity in set theory after interpreting them as logical negations to each other. The present Part II considers the previous Gödel’s paper (1930) (and more precisely, the negation of “Satz VII”, or “the completeness theorem”) as a necessary condition for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Mac Lane, Bourbaki, and Adjoints: A Heteromorphic Retrospective.David Ellerman - manuscript
    Saunders Mac Lane famously remarked that "Bourbaki just missed" formulating adjoints in a 1948 appendix (written no doubt by Pierre Samuel) to an early draft of Algebre--which then had to wait until Daniel Kan's 1958 paper on adjoint functors. But Mac Lane was using the orthodox treatment of adjoints that only contemplates the object-to-object morphisms within a category, i.e., homomorphisms. When Samuel's treatment is reconsidered in view of the treatment of adjoints using heteromorphisms or hets (object-to-object morphisms between objects in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  72
    A limitation on ‎Neutro(‎Neutrosophic‎)‎‎ ‎Soft ‎Subrings and ‎S‎oft ‎Subideals‎‎.Rasuli Rasul & Mohammad Hamidi - manuscript
    In this study‎, ‎we introduce a‎ ‎type ‎of ‎neutrosophic ‎subset‎ concepts ‎such as‎ soft subrings‎, ‎soft subideals‎, ‎the residual quotient of soft subideals‎, ‎quotient rings of a ring by soft subideals‎, ‎soft subideals of soft subrings and investigate some of their properties and structured characteristics‎. ‎Also, we investigate them under homomorphisms and obtain some new ‎results. ‎Indeed, ‎the ‎relation ‎between ‎ ‎u‎ncertainty ‎and ‎semi-algebraic is presented and is analyzed ‎to ‎the ‎important ‎results ‎in ‎neutrosophic ‎subset ‎theory.‎‎‎.
    Download  
     
    Export citation  
     
    Bookmark  
  22. A Refutation of Goodman's Type‐Token Theory of Notation.John Dilworth - 2003 - Dialectica 57 (3):330-336.
    In Languages of Art, Nelson Goodman presents a general theory of symbolic notation. However, I show that his theory could not adequately explain possible cases of natural language notational uses, and argue that this outcome undermines, not only Goodman's own theory, but any broadly type versus token based account of notational structure.Given this failure, an alternative representational theory is proposed, in which different visual or perceptual aspects of a given physical inscription each represent a different letter, word, or other notational (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  23. New directions in type-theoretic grammars.Reinhard Muskens - 2010 - Journal of Logic, Language and Information 19 (2):129-136.
    This paper argues for the idea that in describing language we should follow Haskell Curry in distinguishing between the structure of an expression and its appearance or manifestation . It is explained how making this distinction obviates the need for directed types in type-theoretic grammars and a simple grammatical formalism is sketched in which representations at all levels are lambda terms. The lambda term representing the abstract structure of an expression is homomorphically translated to a lambda term representing its manifestation, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  25
    Hybrid Cloud-Machine Learning Framework for Efficient Cardiovascular Disease Risk Prediction and Treatment Planning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):460-480.
    Data preparation, feature engineering, model training, and performance evaluation are all part of the study methodology. To ensure reliable and broadly applicable models, we utilize optimization techniques like Grid Search and Genetic Algorithms to precisely adjust model parameters. Features including age, blood pressure, cholesterol levels, and lifestyle choices are employed as inputs for the machine learning models in the dataset, which consists of patient medical information. The predictive capacity of the model is evaluated using evaluation measures, such as accuracy, precision, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Whispers and Shouts. The measurement of the human act.Fernando Flores Morador & Luis de Marcos Ortega (eds.) - 2021 - Alcalá de Henares, Madrid: Departement of Computational Sciences. University of Alcalá; Madrid.
    The 20th Century is the starting point for the most ambitious attempts to extrapolate human life into artificial systems. Norbert Wiener’s Cybernetics, Claude Shannon’s Information Theory, John von Neumann’s Cellular Automata, Universal Constructor to the Turing Test, Artificial Intelligence to Maturana and Varela’s Autopoietic Organization, all shared the goal of understanding in what sense humans resemble a machine. This scientific and technological movement has embraced all disciplines without exceptions, not only mathematics and physics but also biology, sociology, psychology, economics etc. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. The Forgetful Mind Version 3.3 (2nd edition).Evan Gyde - manuscript
    I have added as an addendum an alternate and simpler theory for that which filters, ratifies, encrypts and motivates our sensory stimuli to generate purpose and intent, facilitating working memory in our pre-frontal cortex to attempt a solution. I think this theory may make the neural homunculus redundant. When the brain engages a task, it requires a source of motivating energy. If the task becomes too complex, we are at risk of overloading this source. In this situation, endorphins intervene to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. The Role of Information in Consciousness.Harry Haroutioun Haladjian - forthcoming - Psychology of Consciousness: Theory, Research, and Practice.
    This article comprehensively examines how information processing relates to attention and consciousness. We argue that no current theoretical framework investigating consciousness has a satisfactory and holistic account of their informational relationship. Our key theoretical contribution is showing how the dissociation between consciousness and attention must be understood in informational terms in order to make the debate scientifically sound. No current theories clarify the difference between attention and consciousness in terms of information. We conclude with two proposals to advance the debate. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  83
    “Chosenness, Agapism, and the Search for Moderation between Nationhood and Universalism”.S. Berman Nadav - 2024 - da'at 92:7-36.
    Chosenness, Agapism, and the Search for Moderation between Nationhood and Universalism -/- Abstract The idea of collective Chosenness (nivḥarut) was interpreted by Jewish thinkers in two initial ways: Chosenness as a divine gift which is somehow encrypted in the body of each Jewish individual, and Chosenness as a normatively acquired (rather than inherited) property. Numerous attempts were made to defend these approaches, and to mediate between them. This paper examine the idea of Chosenness from a novel perspective, by interrogating it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. (1 other version)The Necessity of Exosomatic Knowledge for Civilization and a Revision to our Epistemology.Ray Scott Percival - 2012 - In Norbert-Bertrand Barbe (ed.), LE NÉANT DANS LA PENSÉE CONTEMPORAINE. Publications du Centre Fran. pp. 136-150.
    The traditional conception of knowledge is justified, true belief. This located knowledge within the person's mind. I argue that due to the explosive growth of what I like to call "exosomatic knowledge," knowledge outside the mind, the traditional conception has outlived its relevance. On the other hand, Karl Popper's (1934) Falsificationism, with its emphasis on the objective character of knowledge, is not only a sounder, but also a more appropriate theory of knowledge for understanding the nature and growth of civilization. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. The Flying Termite.Laszlo Katona (ed.) - 2014 - Vernon Press.
    ABSTRACT of The Flying Termite by L.L. Katona -/- In this book I would like to show the term “intelligence“ has a universal, non-anthropomorphic meaning. We can perceive intelligence in dogs, dolphins or gorillas without understanding of it, but intelligence can be also seen in many other things from insects and the Solar System to elementary particles or the rules of a triangle. But that doesn’t mean intelligence comes from Intelligent Design, yet alone a Designer, they seems to be the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Nicholas Rescher, Leibniz and Cryptography: An Account on the Occasion of the Initial Exhibition of the Reconstruction of Leibniz’s Cipher Machine. [REVIEW]Stephen Puryear - 2014 - Review of Metaphysics 67 (4):882-884.
    In Part 1 of this short book, Rescher provides an overview of the nature and source of Leibniz’s interest in the theory and practice of cryptanalysis, including his unsuccessful bid to secure an apprentice for John Wallis (1616-1703) with a view to perpetuating the Englishman’s remarkable deciphering abilities. In Part 2, perhaps the most interesting part of the book, Rescher offers his account of the inner workings of Leibniz’s cipher machine. Part 3 provides a brief pictorial history of such machines (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  83
    ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate both individuals (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  36
    Machine Learning-Driven Optimization for Accurate Cardiovascular Disease Prediction.Yoheswari S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    The research methodology involves data preprocessing, feature engineering, model training, and performance evaluation. We employ optimization methods such as Genetic Algorithms and Grid Search to fine-tune model parameters, ensuring robust and generalizable models. The dataset used includes patient medical records, with features like age, blood pressure, cholesterol levels, and lifestyle habits serving as inputs for the ML models. Evaluation metrics, including accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC), assess the model's predictive power.
    Download  
     
    Export citation  
     
    Bookmark  
  36.  28
    Optimized Cloud Computing Solutions for Cardiovascular Disease Prediction Using Advanced Machine Learning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):465-480.
    The world's leading cause of morbidity and death is cardiovascular diseases (CVD), which makes early detection essential for successful treatments. This study investigates how optimization techniques can be used with machine learning (ML) algorithms to forecast cardiovascular illnesses more accurately. ML models can evaluate enormous datasets by utilizing data-driven techniques, finding trends and risk factors that conventional methods can miss. In order to increase prediction accuracy, this study focuses on adopting different machine learning algorithms, including Decision Trees, Random Forest, Support (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  41
    Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark