Search Results - flood ((((electron algorithm) OR (selection algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Evaluation of boruta algorithm in DDoS detection by Noor Farhana, Mohd Zuki, Ahmad Firdaus, Zainal Abidin, Mohd Faaizie, Darmawan, Mohd Faizal, Ab Razak

    Published 2023
    “…To evaluate the Boruta algorithm, multiple classifiers (J48, random forest, naïve bayes, and multilayer perceptron) were used so as to determine the effectiveness of the features selected by the the Boruta algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Design and Implementation of a Robot for Maze-Solving using Flood-Fill Algorithm by Elshamarka, Ibrahim, Saman, Abu Bakar Sayuti

    Published 2012
    “…This paper describes an implementation of a maze-solving robot designed to solve a maze based on the flood-fill algorithm. Detection of walls and opening in the maze were done using ultrasonic range-finders. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  3. 3

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  4. 4

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…While further research requires a special algorithm to improve malware attack detection, in addition to KNN, SVM and Neural Network. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An algorithm to group defects on printed circuit board for automated visual inspection by Khalid, Noor Khafifah, Ibrahim, Zuwairie, Zainal Abidin, Mohamad Shukri

    Published 2008
    “…The proposed algorithm includes several image processing operations such as image subtraction, image adding, logical XOR and NOT, and flood fill operator…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol by Napiah, Mohamad Nazrin, Idris, Mohd Yamani Idna, Ramli, Roziana, Ahmedy, Ismail

    Published 2018
    “…The proposed CHA-IDS utilize best first and greedy stepwise with correlation-based feature selection to determine only significant features needed for the intrusion detection. …”
    Get full text
    Get full text
    Article
  7. 7

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Adaptive optimization techniques such as fuzzy logic controller (FLC), reinforcement learning are discussed in this thesis in order to adopt Q-leaning algorithm to FLCs. We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
    Get full text
    Get full text
    Thesis
  8. 8

    SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan by Mazlan, Muhammad Muhaimin Aiman

    Published 2018
    “…Therefore, the aim of this project is to develop a firewall software called “FIREARMS” that can prevent one type of DDoS which is SYN-Flood attack. The core detection and prevention algorithm which is the support vector machine (SVM) were implemented in this project. …”
    Get full text
    Get full text
    Student Project
  9. 9
  10. 10

    River segmentation with Atrous Convolution via DeepLabv3 / Nur Adilah Hamid by Hamid, Nur Adilah

    Published 2020
    “…Flood has been identified as a common issue for years. …”
    Get full text
    Get full text
    Student Project
  11. 11

    A survey of interest flooding attack in named-data networking: Taxonomy, performance and future research challenges by Ren-Ting Lee, Yu-Beng Leau, Yong Jin Park, Mohammed Anbar

    Published 2021
    “…This study aimed to conduct a comprehensive survey of state-of-the-art IFA detection mechanisms and analyzed the algorithms used. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Image processing-based flood detection by Ariawan, Angga, Pebrianti, Dwi, Ronny, Akbar, Yudha Maulana, Margatama, Lestari, Bayuaji, Luhur

    Published 2019
    “…This paper discusses about the design of an online ftood detection and early warning system which integrated to using Raspberry-PI and optical sensor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    DDoS Classification using Combined Techniques by Mohd Yusof, Mohd Azahari, Mohd Safar, Noor Zuraidin, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Jofri, Muhamad Hanif, Mohamed, Juliana, Omar, Abdul Halim, Bahrudin, Ida Aryanie, Mohamed Ali @ Md Hani, Mohd Hatta

    Published 2024
    “…An attacker has the capability to generate various types of DDoS attacks simultaneously, including the Smurf attack, ICMP flood, UDP flood, and TCP SYN flood. This DDoS issue encouraged the design of a classification technique against DDoS attacks that enter a computer network environment. …”
    Get full text
    Get full text
    Article
  14. 14

    Disaster monitoring in urban and remote areas using satellite stereo images: A depth estimation approach by Ahmad, R.F., Malik, A.S., Qayyum, A., Kamel, N.

    Published 2015
    “…Remote sensing to monitor natural disasters has been proven useful for detection of earthquakes, land sliding, flooding, wildfire and volcanic activity. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm by Alotaibi, Faiz E A L

    Published 2019
    “…The diacritic detections are performed using a region-based algorithm with 89% accuracy and 95% improved by using flood fill segmentations method. 2DMED feature extraction accuracy was 90% for diacritics and 96% improved by applied CNN. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of river water level estimation from surveillance cameras for flood monitoring system using deep learning techniques by Muhadi, Nur 'Atirah

    Published 2022
    “…Around 70% of global disasters are related to hydro-meteorological events such as drought, floods, and cyclones. Therefore, researchers and experts carried out many studies on flood hazards in order to reduce the impact of flood magnitude and flood frequency. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Improving The Algorithm To Detect Internet Worms by Rasheed, Mohmmad M

    Published 2008
    “…Active worm spread in an automated fashion and can flood the internet in a very short time. The aim of this project is to improved algorithm to detect internet worm by two sub algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20