Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

A Technical Perspective On Integrating Artificial Intelligence To Solid-State Welding, Sambath Yaknesh, Natarajan Rajamurugu, Prakash K. Babu, Saravanakumar Subramaniyan, Sher A. Khan, C. Ahamed Saleel, Mohammad Nur-E-Alam, Manzoore E. M. Soudagar Jan 2024

A Technical Perspective On Integrating Artificial Intelligence To Solid-State Welding, Sambath Yaknesh, Natarajan Rajamurugu, Prakash K. Babu, Saravanakumar Subramaniyan, Sher A. Khan, C. Ahamed Saleel, Mohammad Nur-E-Alam, Manzoore E. M. Soudagar

Research outputs 2022 to 2026

The implementation of artificial intelligence (AI) techniques in industrial applications, especially solid-state welding (SSW), has transformed modeling, optimization, forecasting, and controlling sophisticated systems. SSW is a better method for joining due to the least melting of material thus maintaining Nugget region integrity. This study investigates thoroughly how AI-based predictions have impacted SSW by looking at methods like Artificial Neural Networks (ANN), Fuzzy Logic (FL), Machine Learning (ML), Meta-Heuristic Algorithms, and Hybrid Methods (HM) as applied to Friction Stir Welding (FSW), Ultrasonic Welding (UW), and Diffusion Bonding (DB). Studies on Diffusion Bonding reveal that ANN and Generic Algorithms can predict outcomes …


Timing Attack Detection On Bacnet Via A Machine Learning Approach, Michael N. Johnstone, Matthew Peacock, J I. Den Hartog Jan 2015

Timing Attack Detection On Bacnet Via A Machine Learning Approach, Michael N. Johnstone, Matthew Peacock, J I. Den Hartog

Australian Information Security Management Conference

Building Automation Systems (BAS), alternatively known as Building Management Systems (BMS), which centralise the management of building services, are often connected to corporate networks and are routinely accessed remotely for operational management and emergency purposes. The protocols used in BAS, in particular BACnet, were not designed with security as a primary requirement, thus the majority of systems operate with sub-standard or non-existent security implementations. As intrusion is thus likely easy to achieve, intrusion detection systems should be put in place to ensure they can be detected and mitigated. Existing intrusion detection systems typically deal only with known threats (signature-based approaches) …


Applying Feature Selection To Reduce Variability In Keystroke Dynamics Data For Authentication Systems, Mark Abernethy, Shri Rai Dec 2012

Applying Feature Selection To Reduce Variability In Keystroke Dynamics Data For Authentication Systems, Mark Abernethy, Shri Rai

Australian Information Warfare and Security Conference

Authentication systems enable the verification of claimed identity. Password-based authentication systems are ubiquitous even though such systems are amenable to numerous attack vectors and are therefore responsible for a large number of security breaches. Biometrics has been increasingly researched and used as an alternative to password-based systems. There are a number of alternative biometric characteristics that can be used for authentication purposes, each with different positive and negative implementation factors. Achieving a successful authentication performance requires effective data processing. This study investigated the use of keystroke dynamics for authentication purposes. A feature selection process, based on normality statistics, was applied …