Search Results - (( mobile iteration method algorithm ) OR ( flood detection based algorithm ))
Search alternatives:
- mobile iteration »
- iteration method »
- method algorithm »
- flood detection »
- detection based »
-
1
Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm
Published 2019“…The diacritic detections are performed using a region-based algorithm with 89% accuracy and 95% improved by using flood fill segmentations method. 2DMED feature extraction accuracy was 90% for diacritics and 96% improved by applied CNN. …”
Get full text
Get full text
Thesis -
2
Improving The Algorithm To Detect Internet Worms
Published 2008“…Active worm spread in an automated fashion and can flood the internet in a very short time. The aim of this project is to improved algorithm to detect internet worm by two sub algorithm. …”
Get full text
Get full text
Get full text
Thesis -
3
Design and Implementation of a Robot for Maze-Solving using Flood-Fill Algorithm
Published 2012“…This paper describes an implementation of a maze-solving robot designed to solve a maze based on the flood-fill algorithm. Detection of walls and opening in the maze were done using ultrasonic range-finders. …”
Get full text
Get full text
Get full text
Citation Index Journal -
4
Extended bat algorithm for PID controller tuning of wheeled mobile robot and swarm robotics target searching strategy
Published 2020“…Hence, EBA which is the proposed method is able to develop target searching algorithm for swarm robotic system and tuning PD controller gains for wheeled mobile robot.…”
Get full text
Get full text
Thesis -
5
A Mobile Application For Stock Price Prediction
Published 2021“…There were three iteration in this project to develop and enhance the functionality of the mobile application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Hybrid path planning for indoor robot with Laplacian Behaviour-based control via four point-explicit group
Published 2014“…In this paper, a robust searching algorithm to generate path planning for mobile robot is proposed. …”
Get full text
Get full text
Get full text
Article -
7
Image processing-based flood detection
Published 2019Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Detection and mapping of May 2021 flood in Beaufort, Sabah using Sentinel-1 SAR and Sentinel-2 multispectral in Google Earth Engine
Published 2022“…We analysed the S-1 VV, VH, VV/VH imagery by pixels clustering using object based SNIC classification and Machine Learning (ML) algorithm for extraction of waterbody. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Advancing Multiband OFDM Channel Sounding: An Iterative Time Domain Estimation for Spectrally Constrained Systems
Published 2023“…The results show that the proposed SCTD method supersedes the conventional techniques for stationary and mobile frequency selective channel scenarios within ten iterations. …”
Get full text
Get full text
Article -
11
Advancing Multiband OFDM Channel Sounding: An Iterative Time Domain Estimation for Spectrally Constrained Systems
Published 2023“…The results show that the proposed SCTD method supersedes the conventional techniques for stationary and mobile frequency selective channel scenarios within ten iterations. …”
Get full text
Get full text
Article -
12
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
MMS : mobile monitoring system using electrical capacitance tomography (ECT)
Published 2008“…The information obtained in the PC can be reconstructed using linear back projection algorithm. In order to improve data result, iterative algorithm has been implemented in this system in order to obtain a precise image of the flow in the pipeline.…”
Get full text
Get full text
Monograph -
16
RFID-enabled supply chain detection using clustering algorithms
Published 2015“…We propose to use clustering algorithms in order to detect counterfeit in supply chain management. …”
Get full text
Get full text
Conference or Workshop Item -
17
DDoS Classification using Combined Techniques
Published 2024“…The four techniques focused in this research are PTA-SVM, PTA-NB, PTA-LR and PTA-KNN. Based on the results of detection accuracy and false positive rate for all the techniques involved, it proves the PTA-KNN technique is a more effective technique in the context of detection of incoming packets whether DDoS attacks or normal packets…”
Get full text
Get full text
Article -
18
DDoS Classification using Combined Techniques
Published 2024“…The four techniques focused in this research are PTA-SVM, PTA-NB, PTA-LR and PTA-KNN. Based on the results of detection accuracy and false positive rate for all the techniques involved, it proves the PTA-KNN technique is a more effective technique in the context of detection of incoming packets whether DDoS attacks or normal packets.…”
Get full text
Get full text
Article -
19
Development of river water level estimation from surveillance cameras for flood monitoring system using deep learning techniques
Published 2022“…Therefore, this study introduces a visual surveillance concept to monitor the flood event in a specific area, based on surveillance cameras and computer vision approaches to obtain instant flood inundation information during flood events. …”
Get full text
Get full text
Thesis -
20
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis
