Search Results - (( deviation detection packet algorithm ) OR ( using codification using algorithm ))
Search alternatives:
- deviation detection »
- using codification »
- codification using »
- detection packet »
- packet algorithm »
- using algorithm »
-
1
Network intrusion detection and alert system
Published 2024“…Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Intelligent fault diagnosis for broken rotor bar using wavelet packet signature analysis
Published 2016“…The fault detection and classification algorithm is carried out under the unknown dataset and the off-line testing results with 98.8% classification accuracy indicate good reliability of the proposed method in identifying broken rotor bars severity.…”
Get full text
Get full text
Thesis -
3
Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest
Published 2026“…The framework analyzes extracted traffic features, including packet length and IP address patterns, to detect deviations from normal behaviour without requiring labelled data. …”
Get full text
Get full text
Get full text
Article -
4
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
5
Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar
Published 2012“…Fast and accurate techniques are required for detecting the disturbances so that proper mitigation of power quality problems can be implemented. …”
Get full text
Get full text
Thesis -
6
Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani
Published 2015“…In case of multiple filterbanks the cepstral features are used in different experts for performing classification based on different representation of speeches. …”
Get full text
Get full text
Thesis
