Search Results - flow ((generation algorithm) OR (detection algorithm))

Refine Results
  1. 1

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…This paper introduces TLSMalDetect, a TLS-based malware detection approach that integrates periodicity-independent entropy-based flow set (EFS) features generated by a flow feature transformation technique to solve flow feature utilization issues in related research. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa by Muhd Suberi, Anis Azwani

    Published 2020
    “…Therefore, a new diagnostic algorithm based on DL is proposed for ischemic stroke detection in PF. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Flow-based approach on bro intrusion detection by Alaidaros, Hashem, Mahmuddin, Massudi

    Published 2017
    “…Then, the model made use the machine learning classification algorithms for attribute evaluation and Bro policy scripts for detecting malicious flows. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…According to the results obtained from the developed algorithm and implementation tools, a high number of users can be physically possible and provided with support. …”
    Get full text
    Get full text
    Article
  5. 5

    Motion detection using Horn-Schunck optical flow by Wan Nur Azhani, W. Samsudin, Kamarul Hawari, Ghazali

    Published 2012
    “…This system is design to detect motion in a crowd using one of the optical flow algorithms, Horn-Schunck method. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  7. 7

    CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets by Alaidaros, Hashem Mohammed

    Published 2017
    “…However, flow-based detection still suffers from the generation of the false positive alerts due to incomplete data input. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Fault detection and diagnosis for gas density monitoring using multivariate statistical process control by Norul Shahida, Che Din, Noor Asma Fazli, Abdul Samad, Chin, Sim Yee

    Published 2011
    “…Therefore, an efficient fault detection and diagnosis algorithm needs to be developed to detect faults that are present in a process and pinpoint the cause of these detected faults. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Instrumentation Monitoring For Heavy Metal Detection In Batik Industry by Kodi, Saravanan Thunsh

    Published 2019
    “…For field work application, the effect of viscosity, pressure drop and condition of pipe for steady flow. The flow changes affect the measurement sensor reading due to the turbulent flow. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack by Izaddoost, Alireza

    Published 2008
    “…As a consequence of filtering of normal flow, the percentage of packets belonging to the attack flow will be expanded and the chance of generating ICMP traceback messages which contain attack flow information will be increased. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Simultaneous fault diagnosis based on multiple kernel support vector machine in nonlinear dynamic distillation column by Taqvi, S.A.A., Zabiri, H., Uddin, F., Naqvi, M., Tufa, L.D., Kazmi, M., Rubab, S., Naqvi, S.R., Maulud, A.S.

    Published 2022
    “…In the classification of simultaneous faults, a combination of two, three, and four faults is introduced for the performance evaluation of the proposed MK-SVM algorithm. The result showed that the proposed MK-SVM has a high fault detection rate (FDR) of 99.51 and a very low misclassification rate (MR) of 0.49. …”
    Get full text
    Get full text
    Article
  13. 13

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. Forward chaining strategy is used to interpret the rule-based system. …”
    Get full text
    Get full text
    Article
  14. 14

    Bidirectional detection method using for hall effects sensors for water flow measurement system by Garmabdari, Rasoul

    Published 2014
    “…Lastly, a measurement and monitoring algorithm is developed based on Labview to calculate the flow rate, water consumption and detect the error source and flow direction. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Artificial neural network for anomalies detection in distillation column by Taqvi, S.A., Tufa, L.D., Zabiri, H., Mahadzir, S., Shah Maulud, A., Uddin, F.

    Published 2017
    “…The effect of these faults on process variables i.e. changes in distillate and bottom composition, distillate and bottom temperature, bottom flow rate, and the pressure drop is observed. The network is trained using back propagation algorithm to determine root mean square error (RMSE). …”
    Get full text
    Get full text
    Article
  17. 17

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18
  19. 19
  20. 20

    A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines by Tahan, M., Muhammad, M., Abdul Karim, Z.A.

    Published 2017
    “…Two back-propagation training algorithms, namely the Levenberg–Marquardt and Bayesian regularization algorithms, and the k-fold cross-validation technique, were employed to train the optimal networks using a training data set. …”
    Get full text
    Get full text
    Article