Claim Missing Document
Check
Articles

Found 2 Documents
Search

Spam detection by using machine learning based binary classifier Mohd Fadzil Abdul Kadir; Ahmad Faisal Amri Abidin; Mohamad Afendee Mohamed; Nazirah Abdul Hamid
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 1: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i1.pp310-317

Abstract

BecauseĀ of its ease of use and speed compared to other communication applications, email is the most commonly used communication application worldwide. However, a major drawback is its inability to detect whether mail content is either spam or ham. There is currently an increasing number of cases of stealing personal information or phishing activities via email. This project will discuss how machine learning can help in spam detection. Machine learning is an artificial intelligence application that provides the ability to automatically learn and improve data without being explicitly programmed. A binary classifier will be used to classify the text into two different categories: spam and ham. This research shows the machine learning algorithm in the Azure-based platform predicts the score more accurately compared to the machine learning algorithm in visual studio, hybrid analysis and JoeSandbox cloud.
Addition chain heuristics in application to elliptic curve cryptosystems Mohamad Afendee Mohamed; Yahaya Garba Shawai; Mohd Noor Derahman; Abd Rasid Mamat; Siti Dhalila Mohd Satar; Ahmad Faisal Amri Abidin; Mohd Fadzil Abdul Kadir
International Journal of Advances in Applied Sciences Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijaas.v13.i3.pp546-555

Abstract

The idea of an addition chain can be applied to scalar multiplication involving huge number operations in elliptic curve cryptosystems. In this article, initially, we study the taxonomy of the addition chain problem to build up an understanding of the problem. We then examine the mathematics behind an optimal addition chain that includes the theoretical boundary for the upper limit and lower limit which laid the foundation for experimentation hereafter. In the following, we examine different addition chain solutions that were used to increase efficiency in scalar multiplication. To avoid any possible confusion, we intentionally separated the discussion into two modules called integer recoding method and chain generator based on the heuristics method. These methods were developed by considering various aspects such as the space within which the operation is executed, the curve that is selected, the formulation to express the original equation, and the choices of operation and arithmetic, all together to improve operational efficiency.