Search Results - (( flow ((optimization algorithm) OR (detection algorithm)) ) OR ( flow encryption algorithm ))

Search alternatives:

Refine Results
  1. 1

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  3. 3

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimizing Ram Testing Method For Test Time Saving Using Automatic Test Equipment by Kesavan Prabagaran, Premkumar

    Published 2017
    “…A memory Build-in Self-test (BIST) design with capability of algorithm failing sequence capture have been developed to implement in the Automate Test Equipment (ATE) flow for production screen. 3 selected algorithm have been tested on the 8 detect units in ATE flow to prove the concept of this method. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A review of wave-net identical learning & filling-in in a decomposition space of (JPG-JPEG) sampled images by Al-Azzawi, Alaa Khamees, Saripan, M. Iqbal, Jantan, Adznan, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
    Get full text
    Get full text
    Article
  8. 8

    The impact of executive function and aerobic exercise recognition in obese children under deep learning by JING, XIN, ABDULLAH, BORHANNUDIN, ABU SAAD, HAZIZI, YANG, XIANGKUN

    Published 2025
    “…The OpenPose motion recognition model optimized with STN and Lucas–Kanade optical flow algorithm not only exhibits superior performance in keypoint detection and pose estimation but also positively influences the physical health and functional capacity of children.…”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Execution time optimization analysis on multiple algorithms performance of moving object edge detection by Islam S.Z., Islam S.Z., Jidin R., Mohd. Ali Mohd.A.

    Published 2023
    “…Sobel and Canny edge detection algorithms have been described with pseudo code and detailed flow chart and implemented in C and MATLAB respectively on different platforms to evaluate performance and execution time for moving cars. …”
    Conference paper
  11. 11

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm by Khalifa, Othman Omran, Wajdi, Muhammad H., Saeed, Rashid A., Hassan Abdalla Hashim, Aisha, Ahmed, Muhammed Z., Ali, Elmustafa Sayed

    Published 2022
    “…Vehicle detection in Intelligent Transportation Systems (ITS) is a key factor ensuring road safety, as it is necessary for the monitoring of vehicle flow, illegal vehicle type detection, incident detection, and vehicle speed estimation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…Resource utilization is optimized, and the total number of clock cycles required is found to be 15 initially, in addition to one clock cycle per member of algorithm population. …”
    Get full text
    Get full text
    Article
  15. 15

    Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using asic design flow: article / Nurzaima Mahmod by Mahmod, Nurzaima

    “…This method provides magnificent speed up over than traditional sequential implementation methods while it sensitivity detection is still remained. To optimize the performance of the algorithm by exploiting parallelism in the design several techniques have been developed. …”
    Get full text
    Get full text
    Article
  16. 16

    Adaptive Fast Orthogonal Search (FOS) algorithm for forecasting streamflow by Osman A., Afan H.A., Allawi M.F., Jaafar O., Noureldin A., Hamzah F.M., Ahmed A.N., El-shafie A.

    Published 2023
    “…Data handling; Forecasting; Nonlinear systems; Regression analysis; Religious buildings; Rivers; Stochastic systems; Stream flow; Fast orthogonal searches; Forecasting accuracy; Forecasting models; High dams; Optimization modeling; Optimization scheme; Pole zero cancellation; Streamflow forecasting; Stochastic models; algorithm; artificial intelligence; hydrological modeling; identification method; optimization; river basin; streamflow; Aswan Dam; Nile River…”
    Article
  17. 17

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using ASIC design flow / Nurzaima Mahmod by Mahmod, Nurzaima

    Published 2010
    “…This method provides magnificent speed up over than traditional sequential implementation methods while it sensitivity detection is still remained. To optimize the performance of the algorithm by exploiting parallelism in the design several techniques have been developed. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios by MUHAMMAD, SHOAIB, ASAD, ULLAH, Irshad, Ahmed Abbasi, Fahad, Algarni, Adnan Shahid, Khan

    Published 2022
    “…EvoKeyNet and KFCRNet are the proposed classification models that leverage feature extraction from optimal keyframes. EvoKeyNet utilizes an evolutionary algorithm to select optimal feature attributes, while KFCRNet employs an ensemble of LSTM, Bi-LSTM, and GRU models with a voting scheme. …”
    Get full text
    Get full text
    Get full text
    Article