“…The graphs visualized the optimal security achieved in the proposed model compared to other techniques. Figure 5 Encryption time comparison of proposed and existing study [35] Figure 6 Decryption time comparison of proposed and existing study [35] Figure 7 Key size evaluation of proposed and existing [35] From Table 7 [36], it is found that existing methods such as Random Forest (RF), Logistic Regression (LR), Support Vector Machine (SVM), Extreme Learning Machine (ELM), K-Nearest Neighbour (KNN) and [36] showed better precision, recall, Gme an, MC, AUC, specificity and E. However the proposed system showed a high rate of E with 95.01%, precision with 97.03%, recall with 96.36%, G-mean with 95.09%, MC with 17.43%, specificity with 96.63% and AUC with 97.63%. This proved its efficacy than conventional systems [36].…”