Search Results - flood ((((selection algorithm) OR (function algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…Three algorithms of Linear (PURELIN), hyperbolic tangent sigmoid (TANSIG) and logistic sigmoid (LOGSIG) activation functions were selected for output layer. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…While further research requires a special algorithm to improve malware attack detection, in addition to KNN, SVM and Neural Network. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Evaluation of boruta algorithm in DDoS detection by Noor Farhana, Mohd Zuki, Ahmad Firdaus, Zainal Abidin, Mohd Faaizie, Darmawan, Mohd Faizal, Ab Razak

    Published 2023
    “…To evaluate the Boruta algorithm, multiple classifiers (J48, random forest, naïve bayes, and multilayer perceptron) were used so as to determine the effectiveness of the features selected by the the Boruta algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Implementation of machine learning algorithms for streamflow prediction of Dokan dam by Sarmad Dashti Latif, Mr.

    Published 2023
    “…The input combinations are selected based on the auto-correlation function (ACF). …”
    text::Thesis
  7. 7

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…As a result, developing an efficient controller-agnostic network intrusion-detection method is imperative. We propose a diverse fusion-selection approach that stands on Oracle to be applied to the classifier ensemble design, where the Oracle is a random linear function. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A new particle swarm optimization for wireless mesh routing protocol by Abd. Rahman, Tharek

    Published 2008
    “…We test the propose algorithm in network simulator 2 (ns2). Based on the results, we proven that PSO-SIIW algorithm can be applied to MPR calculation in OLSR.…”
    Get full text
    Monograph
  9. 9

    Investigation of cross-entropy-based streamflow forecasting through an efficient interpretable automated search process by Chong K.L., Huang Y.F., Koo C.H., Sherif M., Ahmed A.N., El-Shafie A.

    Published 2024
    “…Due to the distinctive characteristics of these two adopted forms, selecting the correct algorithm for the machine learning problem along with their hyperparameter tuning process is critical to the realization of the desired results. …”
    Article
  10. 10

    Application of the Hybrid Artificial Neural Network Coupled with Rolling Mechanism and Grey Model Algorithms for Streamflow Forecasting Over Multiple Time Horizons by Yaseen, Zaher Mundher, Fu, Minglei, Wang, Chen, Mohtar, Wan Hanna Melini Wan, Deo, Ravinesh C., El-Shafie, Ahmed

    Published 2018
    “…The rolling mechanism method is applied to smooth out the dataset based on the antecedent values of the model inputs before being applied to the GM algorithm. The optimization of the input datasets selection was performed using auto-correlation (ACF) and partial auto-correlation (PACF) functions. …”
    Get full text
    Get full text
    Article
  11. 11

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm by Alotaibi, Faiz E A L

    Published 2019
    “…The diacritic detections are performed using a region-based algorithm with 89% accuracy and 95% improved by using flood fill segmentations method. 2DMED feature extraction accuracy was 90% for diacritics and 96% improved by applied CNN. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol by Napiah, Mohamad Nazrin, Idris, Mohd Yamani Idna, Ramli, Roziana, Ahmedy, Ismail

    Published 2018
    “…The proposed CHA-IDS utilize best first and greedy stepwise with correlation-based feature selection to determine only significant features needed for the intrusion detection. …”
    Get full text
    Get full text
    Article
  15. 15

    Flood Routing in River Reaches Using a Three-Parameter Muskingum Model Coupled with an Improved Bat Algorithm by Farzin, Saeed, Singh, Vijay, Karami, Hojat, Farahani, Nazanin, Ehteram, Mohammad, Kisi, Ozgur, Allawi, Mohammed Falah, Mohd, Nuruol Syuhadaa, El-Shafie, Ahmed

    Published 2018
    “…A common hydrologic method of flood routing is the Muskingum method. The present study attempted to develop a three-parameter Muskingum model considering lateral flow for flood routing, coupling with a new optimization algorithm namely, Improved Bat Algorithm (IBA). …”
    Get full text
    Get full text
    Article
  16. 16

    Improving The Algorithm To Detect Internet Worms by Rasheed, Mohmmad M

    Published 2008
    “…Active worm spread in an automated fashion and can flood the internet in a very short time. The aim of this project is to improved algorithm to detect internet worm by two sub algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam by Lai, Vivien Mei Yen

    Published 2023
    “…This intricately added to the reservoir and dam issues in Malaysia, particularly the frequent intense rainfall within short periods of time, which made it difficult for the reservoir and dam operator to monitor and maintain the storage level of the reservoir and discharge water downstream to prevent overflow and flooding. Consequently, seeking managing of reservoir optimisation operations had always been at the forefront and to improve managing, algorithms have had been presented over the past few decades, beginning with conventional algorithms, followed by heuristic algorithms, and finally, the meta-heuristic algorithms (MHAs). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan by Mazlan, Muhammad Muhaimin Aiman

    Published 2018
    “…Therefore, the aim of this project is to develop a firewall software called “FIREARMS” that can prevent one type of DDoS which is SYN-Flood attack. The core detection and prevention algorithm which is the support vector machine (SVM) were implemented in this project. …”
    Get full text
    Get full text
    Student Project
  20. 20

    Flood detector with IoT notifications / Mohammad Fazrul Fahmi Mohammad Razali by Mohammad Razali, Mohammad Fazrul Fahmi

    Published 2024
    “…This abstract presents a cutting-edge Internet of Things (IoT)-enabled flood detection system that is intended to provide prompt notifications and alarms in the case of flooding. …”
    Get full text
    Get full text
    Student Project