Search Results - flood ((((replication algorithm) OR (function algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm by Alotaibi, Faiz E A L

    Published 2019
    “…The diacritic detections are performed using a region-based algorithm with 89% accuracy and 95% improved by using flood fill segmentations method. 2DMED feature extraction accuracy was 90% for diacritics and 96% improved by applied CNN. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Flood Routing in River Reaches Using a Three-Parameter Muskingum Model Coupled with an Improved Bat Algorithm by Farzin, Saeed, Singh, Vijay, Karami, Hojat, Farahani, Nazanin, Ehteram, Mohammad, Kisi, Ozgur, Allawi, Mohammed Falah, Mohd, Nuruol Syuhadaa, El-Shafie, Ahmed

    Published 2018
    “…A common hydrologic method of flood routing is the Muskingum method. The present study attempted to develop a three-parameter Muskingum model considering lateral flow for flood routing, coupling with a new optimization algorithm namely, Improved Bat Algorithm (IBA). …”
    Get full text
    Get full text
    Article
  4. 4

    Improving The Algorithm To Detect Internet Worms by Rasheed, Mohmmad M

    Published 2008
    “…Active worm spread in an automated fashion and can flood the internet in a very short time. The aim of this project is to improved algorithm to detect internet worm by two sub algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan by Mazlan, Muhammad Muhaimin Aiman

    Published 2018
    “…Therefore, the aim of this project is to develop a firewall software called “FIREARMS” that can prevent one type of DDoS which is SYN-Flood attack. The core detection and prevention algorithm which is the support vector machine (SVM) were implemented in this project. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Flood detector with IoT notifications / Mohammad Fazrul Fahmi Mohammad Razali by Mohammad Razali, Mohammad Fazrul Fahmi

    Published 2024
    “…This abstract presents a cutting-edge Internet of Things (IoT)-enabled flood detection system that is intended to provide prompt notifications and alarms in the case of flooding. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Design and Implementation of a Robot for Maze-Solving using Flood-Fill Algorithm by Elshamarka, Ibrahim, Saman, Abu Bakar Sayuti

    Published 2012
    “…This paper describes an implementation of a maze-solving robot designed to solve a maze based on the flood-fill algorithm. Detection of walls and opening in the maze were done using ultrasonic range-finders. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  8. 8

    Google the earth: what's next? by Mansor, Shattri

    Published 2010
    “…The scientific challenge is to develop retrieval algorithms that describe the physical measurement process in sufficient detail, yet are simple enough to allow robust inversion of the remotely sensed signals. …”
    Get full text
    Get full text
    Get full text
    Inaugural Lecture
  9. 9

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…While further research requires a special algorithm to improve malware attack detection, in addition to KNN, SVM and Neural Network. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…This thesis aims to apply soft computing techniques including fuzzy logic, neural network and genetic algorithm on different aspects of flood modeling including hydrological homogeneity and flood prediction in southern Caspian Sea Watersheds. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A collaborative model for post flood activities exploiting an enhanced expanding neighborhood search algorithm by Hasan, Md Munirul

    Published 2019
    “…The network performance (e.g., packet delivery ratio nearing 80-90%) also demonstrates the capability of CP-AGCM to provide ProSe in the post-flood scenarios and optimality of efficient search algorithm.…”
    Get full text
    Get full text
    Thesis
  12. 12

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…As a result, developing an efficient controller-agnostic network intrusion-detection method is imperative. We propose a diverse fusion-selection approach that stands on Oracle to be applied to the classifier ensemble design, where the Oracle is a random linear function. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Detection and mapping of May 2021 flood in Beaufort, Sabah using Sentinel-1 SAR and Sentinel-2 multispectral in Google Earth Engine by Stanley Anak Suab, Hitesh Supe, Ram Avtar, Ramzah Dambul, Xinyu Chen

    Published 2022
    “…This study provides the basis of detection and mapping floods using S-1 and S-2 imageries through Machine Learning techniques in GEE for local scope of Sabah, Borneo region and Malaysia.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    INFOBANJIR: innovative geospatial technology for flood information / Zuelaiqa Salmie Salim and Ahmad Zulhilmi Ahmad Faisal by Salim, Zuelaiqa Salmie, Ahmad Faisal, Ahmad Zulhilmi

    Published 2024
    “…The system is integrated with weather data for continuous data collection, processed through sophisticated algorithms to monitor flood info setup. Dashboards and hotspots that prioritize user areas on map fragments empower users to identify hotspots at risk of flooding and take timely response actions to flood events.…”
    Get full text
    Get full text
    Student Project
  15. 15

    Image processing-based flood detection by Ariawan, Angga, Pebrianti, Dwi, Ronny, Akbar, Yudha Maulana, Margatama, Lestari, Bayuaji, Luhur

    Published 2019
    “…This paper discusses about the design of an online ftood detection and early warning system which integrated to using Raspberry-PI and optical sensor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  17. 17

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Adaptive optimization techniques such as fuzzy logic controller (FLC), reinforcement learning are discussed in this thesis in order to adopt Q-leaning algorithm to FLCs. We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
    Get full text
    Get full text
    Thesis
  18. 18

    An algorithm to group defects on printed circuit board for automated visual inspection by Khalid, Noor Khafifah, Ibrahim, Zuwairie, Zainal Abidin, Mohamad Shukri

    Published 2008
    “…The proposed algorithm includes several image processing operations such as image subtraction, image adding, logical XOR and NOT, and flood fill operator…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A community-based peer-to-peer model based on social networks by Modarresi, Amir, Mamat, Ali, Ibrahim, Hamidah, Mustapha, Norwati

    Published 2008
    “…The structure of underlying models has a direct effect on the performance of the search algorithms. In unstructured system like Gnutella query flooding algorithm suffers from poor scalability and considerable network overhead. …”
    Get full text
    Get full text
    Article
  20. 20