Search Results - (( flood detection system algorithm ) OR ( based instruction waste algorithm ))

Refine Results
  1. 1

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Flood detector with IoT notifications / Mohammad Fazrul Fahmi Mohammad Razali by Mohammad Razali, Mohammad Fazrul Fahmi

    Published 2024
    “…This abstract presents a cutting-edge Internet of Things (IoT)-enabled flood detection system that is intended to provide prompt notifications and alarms in the case of flooding. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm by Alotaibi, Faiz E A L

    Published 2019
    “…The diacritic detections are performed using a region-based algorithm with 89% accuracy and 95% improved by using flood fill segmentations method. 2DMED feature extraction accuracy was 90% for diacritics and 96% improved by applied CNN. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Improving The Algorithm To Detect Internet Worms by Rasheed, Mohmmad M

    Published 2008
    “…Active worm spread in an automated fashion and can flood the internet in a very short time. The aim of this project is to improved algorithm to detect internet worm by two sub algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…In this thesis, we investigate the possibility of adapting an intelligent system to an Intrusion Detection System (IDS) by proposing a cooperative and intelligent detection and prevention system using machine learning approaches, and aim to facilitate the detection and prevention process in a distributed environment. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Image processing-based flood detection by Ariawan, Angga, Pebrianti, Dwi, Ronny, Akbar, Yudha Maulana, Margatama, Lestari, Bayuaji, Luhur

    Published 2019
    “…This paper discusses about the design of an online ftood detection and early warning system which integrated to using Raspberry-PI and optical sensor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…While further research requires a special algorithm to improve malware attack detection, in addition to KNN, SVM and Neural Network. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    An algorithm to group defects on printed circuit board for automated visual inspection by Khalid, Noor Khafifah, Ibrahim, Zuwairie, Zainal Abidin, Mohamad Shukri

    Published 2008
    “…The proposed algorithm includes several image processing operations such as image subtraction, image adding, logical XOR and NOT, and flood fill operator…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13

    River segmentation with Atrous Convolution via DeepLabv3 / Nur Adilah Hamid by Hamid, Nur Adilah

    Published 2020
    “…Not only that, the other causes like the structure of the drainage system and engineering are also contributed to flood. …”
    Get full text
    Get full text
    Student Project
  14. 14
  15. 15

    Evaluation of boruta algorithm in DDoS detection by Noor Farhana, Mohd Zuki, Ahmad Firdaus, Zainal Abidin, Mohd Faaizie, Darmawan, Mohd Faizal, Ab Razak

    Published 2023
    “…Distributed Denial of Service (DDoS) is a type of attack that leverages many compromised systems or computers, as well as multiple Internet connections, to flood targeted resources simultaneously. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of river water level estimation from surveillance cameras for flood monitoring system using deep learning techniques by Muhadi, Nur 'Atirah

    Published 2022
    “…In Malaysia, a telemetric forecasting system is currently been used in flood monitoring systems. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    An Innovative Signature Detection System for Polymorphic and Monomorphic Internet Worms Detection and Containment by Rasheed, Mohammad M.

    Published 2012
    “…Most detection algorithms used in current detection systems target only monomorphic worm payloads and offer no defence against polymorphic worms, which changes the payload dynamically. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    DDoS Classification using Combined Techniques by Mohd Yusof, Mohd Azahari, Mohd Safar, Noor Zuraidin, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Jofri, Muhamad Hanif, Mohamed, Juliana, Omar, Abdul Halim, Bahrudin, Ida Aryanie, Mohamed Ali @ Md Hani, Mohd Hatta

    Published 2024
    “…Now-a-days, the attacker's favourite is to disrupt a network system. An attacker has the capability to generate various types of DDoS attacks simultaneously, including the Smurf attack, ICMP flood, UDP flood, and TCP SYN flood. …”
    Get full text
    Get full text
    Article
  20. 20

    DDoS Classification using Combined Techniques by Mohd Yusof, Mohd Azahari, Mohd Safar, Noor Zuraidin, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Jofri, Muhamad Hanif, Mohamed, Juliana, Omar, Abdul Halim, Bahrudin, Ida Aryanie, Mohamed Ali @ Md Hani, Mohd Hatta

    Published 2024
    “…Now-a-days, the attacker's favourite is to disrupt a network system. An attacker has the capability to generate various types of DDoS attacks simultaneously, including the Smurf attack, ICMP flood, UDP flood, and TCP SYN flood. …”
    Get full text
    Get full text
    Article