Search Results - flow ((generation algorithm) OR (detection algorithm))
Search alternatives:
- generation algorithm »
-
1
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…This paper introduces TLSMalDetect, a TLS-based malware detection approach that integrates periodicity-independent entropy-based flow set (EFS) features generated by a flow feature transformation technique to solve flow feature utilization issues in related research. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa
Published 2020“…Therefore, a new diagnostic algorithm based on DL is proposed for ischemic stroke detection in PF. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Flow-based approach on bro intrusion detection
Published 2017“…Then, the model made use the machine learning classification algorithms for attribute evaluation and Bro policy scripts for detecting malicious flows. …”
Get full text
Get full text
Get full text
Article -
4
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…According to the results obtained from the developed algorithm and implementation tools, a high number of users can be physically possible and provided with support. …”
Get full text
Get full text
Article -
5
Motion detection using Horn-Schunck optical flow
Published 2012“…This system is design to detect motion in a crowd using one of the optical flow algorithms, Horn-Schunck method. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
7
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Published 2017“…However, flow-based detection still suffers from the generation of the false positive alerts due to incomplete data input. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Fault detection and diagnosis for gas density monitoring using multivariate statistical process control
Published 2011“…Therefore, an efficient fault detection and diagnosis algorithm needs to be developed to detect faults that are present in a process and pinpoint the cause of these detected faults. …”
Get full text
Get full text
Get full text
Article -
10
Instrumentation Monitoring For Heavy Metal Detection In Batik Industry
Published 2019“…For field work application, the effect of viscosity, pressure drop and condition of pipe for steady flow. The flow changes affect the measurement sensor reading due to the turbulent flow. …”
Get full text
Get full text
Monograph -
11
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…As a consequence of filtering of normal flow, the percentage of packets belonging to the attack flow will be expanded and the chance of generating ICMP traceback messages which contain attack flow information will be increased. …”
Get full text
Get full text
Thesis -
12
Simultaneous fault diagnosis based on multiple kernel support vector machine in nonlinear dynamic distillation column
Published 2022“…In the classification of simultaneous faults, a combination of two, three, and four faults is introduced for the performance evaluation of the proposed MK-SVM algorithm. The result showed that the proposed MK-SVM has a high fault detection rate (FDR) of 99.51 and a very low misclassification rate (MR) of 0.49. …”
Get full text
Get full text
Article -
13
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. Forward chaining strategy is used to interpret the rule-based system. …”
Get full text
Get full text
Article -
14
Bidirectional detection method using for hall effects sensors for water flow measurement system
Published 2014“…Lastly, a measurement and monitoring algorithm is developed based on Labview to calculate the flow rate, water consumption and detect the error source and flow direction. …”
Get full text
Get full text
Thesis -
15
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…The proposed EFDT and hybrid DT-SVM algorithms show a high capability of SDN applications to offer fast detection and classification of conflict flows…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
Artificial neural network for anomalies detection in distillation column
Published 2017“…The effect of these faults on process variables i.e. changes in distillate and bottom composition, distillate and bottom temperature, bottom flow rate, and the pressure drop is observed. The network is trained using back propagation algorithm to determine root mean square error (RMSE). …”
Get full text
Get full text
Article -
17
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
-
20
A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines
Published 2017“…Two back-propagation training algorithms, namely the Levenberg–Marquardt and Bayesian regularization algorithms, and the k-fold cross-validation technique, were employed to train the optimal networks using a training data set. …”
Get full text
Get full text
Article
