Search Results - (( mobile iteration method algorithm ) OR ( flood detection based algorithm ))

Refine Results
  1. 1

    Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm by Alotaibi, Faiz E A L

    Published 2019
    “…The diacritic detections are performed using a region-based algorithm with 89% accuracy and 95% improved by using flood fill segmentations method. 2DMED feature extraction accuracy was 90% for diacritics and 96% improved by applied CNN. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Improving The Algorithm To Detect Internet Worms by Rasheed, Mohmmad M

    Published 2008
    “…Active worm spread in an automated fashion and can flood the internet in a very short time. The aim of this project is to improved algorithm to detect internet worm by two sub algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Design and Implementation of a Robot for Maze-Solving using Flood-Fill Algorithm by Elshamarka, Ibrahim, Saman, Abu Bakar Sayuti

    Published 2012
    “…This paper describes an implementation of a maze-solving robot designed to solve a maze based on the flood-fill algorithm. Detection of walls and opening in the maze were done using ultrasonic range-finders. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  4. 4

    Extended bat algorithm for PID controller tuning of wheeled mobile robot and swarm robotics target searching strategy by Nur Aisyah Syafinaz, Suarin

    Published 2020
    “…Hence, EBA which is the proposed method is able to develop target searching algorithm for swarm robotic system and tuning PD controller gains for wheeled mobile robot.…”
    Get full text
    Get full text
    Thesis
  5. 5

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…There were three iteration in this project to develop and enhance the functionality of the mobile application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Hybrid path planning for indoor robot with Laplacian Behaviour-based control via four point-explicit group by Azali Saudi, Jumat Sulaiman

    Published 2014
    “…In this paper, a robust searching algorithm to generate path planning for mobile robot is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Detection and mapping of May 2021 flood in Beaufort, Sabah using Sentinel-1 SAR and Sentinel-2 multispectral in Google Earth Engine by Stanley Anak Suab, Hitesh Supe, Ram Avtar, Ramzah Dambul, Xinyu Chen

    Published 2022
    “…We analysed the S-1 VV, VH, VV/VH imagery by pixels clustering using object based SNIC classification and Machine Learning (ML) algorithm for extraction of waterbody. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Advancing Multiband OFDM Channel Sounding: An Iterative Time Domain Estimation for Spectrally Constrained Systems by Iqbal, A., Drieberg, M., Jeoti, V., Aziz, A.B.A., Stojanovic, G.M., Simic, M., Hussain, N.

    Published 2023
    “…The results show that the proposed SCTD method supersedes the conventional techniques for stationary and mobile frequency selective channel scenarios within ten iterations. …”
    Get full text
    Get full text
    Article
  11. 11

    Advancing Multiband OFDM Channel Sounding: An Iterative Time Domain Estimation for Spectrally Constrained Systems by Iqbal, A., Drieberg, M., Jeoti, V., Aziz, A.A., Stojanovic, G.M., Simic, M., Hussain, N.

    Published 2023
    “…The results show that the proposed SCTD method supersedes the conventional techniques for stationary and mobile frequency selective channel scenarios within ten iterations. …”
    Get full text
    Get full text
    Article
  12. 12

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    MMS : mobile monitoring system using electrical capacitance tomography (ECT) by Abdul Rahim, Ruzairi, Chan, Kok Seong

    Published 2008
    “…The information obtained in the PC can be reconstructed using linear back projection algorithm. In order to improve data result, iterative algorithm has been implemented in this system in order to obtain a precise image of the flow in the pipeline.…”
    Get full text
    Get full text
    Monograph
  16. 16

    RFID-enabled supply chain detection using clustering algorithms by Azahar, T.F., Mahinderjit-Singh, M., Hassan, R.

    Published 2015
    “…We propose to use clustering algorithms in order to detect counterfeit in supply chain management. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    DDoS Classification using Combined Techniques by Mohd Yusof, Mohd Azahari, Mohd Safar, Noor Zuraidin, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Jofri, Muhamad Hanif, Mohamed, Juliana, Omar, Abdul Halim, Bahrudin, Ida Aryanie, Mohamed Ali @ Md Hani, Mohd Hatta

    Published 2024
    “…The four techniques focused in this research are PTA-SVM, PTA-NB, PTA-LR and PTA-KNN. Based on the results of detection accuracy and false positive rate for all the techniques involved, it proves the PTA-KNN technique is a more effective technique in the context of detection of incoming packets whether DDoS attacks or normal packets…”
    Get full text
    Get full text
    Article
  18. 18

    DDoS Classification using Combined Techniques by Mohd Yusof, Mohd Azahari, Mohd Safar, Noor Zuraidin, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Jofri, Muhamad Hanif, Mohamed, Juliana, Omar, Abdul Halim, Bahrudin, Ida Aryanie, Mohamed Ali @ Md Hani, Mohd Hatta

    Published 2024
    “…The four techniques focused in this research are PTA-SVM, PTA-NB, PTA-LR and PTA-KNN. Based on the results of detection accuracy and false positive rate for all the techniques involved, it proves the PTA-KNN technique is a more effective technique in the context of detection of incoming packets whether DDoS attacks or normal packets.…”
    Get full text
    Get full text
    Article
  19. 19

    Development of river water level estimation from surveillance cameras for flood monitoring system using deep learning techniques by Muhadi, Nur 'Atirah

    Published 2022
    “…Therefore, this study introduces a visual surveillance concept to monitor the flood event in a specific area, based on surveillance cameras and computer vision approaches to obtain instant flood inundation information during flood events. …”
    Get full text
    Get full text
    Thesis
  20. 20