Search Results - (( location detection path algorithm ) OR ( whale notification based algorithm ))*

Refine Results
  1. 1

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…This study employs use Random Forest algorithm to identify and forecast attacks to dynamically locate the attack location in the network for attack graph analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Attack prediction to enhance attack path discovery using improved attack graph by Al-Araji, Zaid Jasim, Abdullah, Raihana Syahirah, Syed Ahmad, Sharifah Sakinah

    Published 2022
    “…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…A routing algorithm has been developed to create a routing path between all transmission towers in the image, which helps identify the power line path. …”
    text::Thesis
  6. 6

    Vehicle route tracking system based on vehicle registration number recognition using template matching algorithm by Lai, Chor Kiew, Md Muzahid, Abu Jafar, Kamarulzaman, Syafiq F.

    Published 2021
    “…The system provide an accuracy around 80% confidence when detecting a vehicle plate number and successfully display the path of the vehicle based on the time and location of the vehicle detected.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…However traveling in such region to the target location, there exist some unknown obstacles for the mobile robot especially in real-world environment with unknown map and unpredictable obstacle location, thus the control algorithms must be able to promptly react upon the unpredictable. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    ROBOT NAVIGATION USING CAMERA BY IDENTIFYING SIGNAGES by ABD RASHID, NOOR AISYAH

    Published 2017
    “…Unique images of signage placed at strategic location to give information for the directions pertaining to a desired path plan. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack by Izaddoost, Alireza

    Published 2008
    “…More useful information about the attack flow provided by the routers along the attack path to the IDS, can provide higher accuracy to locate the attacker. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Mobile Robot with Navigation Control and Communication by Mohammad Yatim, Amirah Izzati

    Published 2016
    “…The robot is designed to implement the project in the study of autonomous navigation and path planning. Other than that, various algorithm can be applied to it with the need to physically access on-board microcontroller for programming. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14

    Development of a prototype solar-powered autonomous vehicle prototype with object detection and avoidance system using Raspberry-Pi by Ogonye, O. Solomon, Dagwa Ishaya Musa, Nurudeen Abdulhakeem Hassan, Okonkwo, Emmanuel, Kulutuye, Precious

    Published 2024
    “…The vehicle uses ultrasonic sensors and a USB webcam to detect and avoid obstacles on its path with the aid of a Raspberry Pie program that effectively executes decision-making changes to manoeuvre the vehicle away from objects on a free path. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Development of a State-Space Observer for Active Noise Control Systems by Muhssin, Mazin T.

    Published 2009
    “…The secondary path of the ANC system is modeled by using the LMS algorithm to complete the design of the Filtered-X Least Mean Square (FXLMS) controller. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An Efficient Route Selection Based on AODV Algorithm for VANET by Nassir Sallom , Kadhim, Mohammed, Muamer N., Mazlina, Abdul Majid, Sinan Q., Mohamd

    Published 2016
    “…The employment of (VANET) assists to increase the data delivery by providing a second path to send an emergency message to the rescue services center (RSC) whenever an accident located at out of coverage area for GSM network. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An Efficient Route Selection based on AODV Algorithm for VANET by Kadhim, Nassir, Mohammed, Muamer N., Mazlina, Abdul Majid, Mohamd, Sinan Q., Tao, Hai

    Published 2016
    “…The employment of (VANET) assists to increase the data delivery by providing a second path to send an emergency message to The Rescue Services Center (RSC) whenever an accident located at out of coverage area of GSM network. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Smart resource tracking and tracing system (SRTTS) by Omar, Emi Normalina, Abu Hassan, Lailatul Faizah, Rochin Demong, Nur Atiqah, Othman, Abdul Kadir, A Rahman, Mohd Khirzan Badzli

    Published 2017
    “…Method used by the system is providing an algorithm on showing the shortest path which will act as a recommender system. …”
    Get full text
    Get full text
    Book Section
  19. 19

    Real time tracking in 3D space by robotic vision by Al-Khateeb, Khalid A. Saeed, Dandu, Mohd Akram

    Published 2007
    “…The tracking is based on passive detection using live TV imaging. The target coordinates are determined by an image processing technique and non-linear prediction algorithm. …”
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Machine Learning Based Detection for Compromised Accounts on Social Media Networks by K., Swapna, M., Rithika, K., Rukmini, S., Swachitha, Y., Komali

    Published 2025
    “…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article