Search Results - (( developing break control algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- developing break »
- java implication »
- break control »
-
1
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
2
-
3
Review on auto-depth control system for an unmanned underwater remotely operated vehicle (ROV) using intelligent controller
Published 2015“…The review on auto-depth control system for ROV, provides insights for readers to design new techniques and algorithms for auto-depth control.…”
Get full text
Get full text
Article -
4
Pyroelectric infrared sensor for intruder detection
Published 2004“…The personal computer plays a significant role in providing the intelligent centralized controls of the entire system. A software package has been developed for visual display, control mechanism configuration, and embedded server-client application.…”
Get full text
Conference or Workshop Item -
5
Optimised multi-robot path planning via smooth trajectory generation
Published 2024“…A MPSO algorithm, without path smoothening, is used for comparison. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
7
Modelling and Control of Ankle Foot Orthosis (AFO) for Children Utilising Soft Computing Towards Intelligent Approach
Published 2024“…Therefore, this research presents the development of a dynamic system and controller of AFO. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique
Published 2022“…The study also developed an algorithm for predictive EMS using fuzzy model predictive control technique based on regression algorithm. …”
Get full text
Get full text
Thesis -
10
-
11
A reliable unicast routing protocol for mobile ad hoc network
Published 2013“…It is also shown that the algorithm contributed greatly to reducing control overhead and although we have extra control packets overhead due to the cluster formation and maintenance, we see 27% to 38% control packets overhead reduction in different network conditions.…”
Get full text
Get full text
Thesis -
12
-
13
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…Another prominent approach is the Dominant Pruning (DP) which is a distributed dominating set algorithm developed to alleviate the impact of flooding in mobile ad-hoc networks. …”
Get full text
Get full text
Get full text
Thesis -
14
