Search Results - (( developing break control algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  2. 2
  3. 3

    Review on auto-depth control system for an unmanned underwater remotely operated vehicle (ROV) using intelligent controller by Mohd Shahrieel , Mohd Aras, Shahrum Shah , Abdullah, Fadilah , Abdul Azis

    Published 2015
    “…The review on auto-depth control system for ROV, provides insights for readers to design new techniques and algorithms for auto-depth control.…”
    Get full text
    Get full text
    Article
  4. 4

    Pyroelectric infrared sensor for intruder detection by Moghavvemi, M., Seng, L.C.

    Published 2004
    “…The personal computer plays a significant role in providing the intelligent centralized controls of the entire system. A software package has been developed for visual display, control mechanism configuration, and embedded server-client application.…”
    Get full text
    Conference or Workshop Item
  5. 5

    Optimised multi-robot path planning via smooth trajectory generation by Loke, Zhi Yu

    Published 2024
    “…A MPSO algorithm, without path smoothening, is used for comparison. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique by Abulifa, Abdulhadi Abdulsalam

    Published 2022
    “…The study also developed an algorithm for predictive EMS using fuzzy model predictive control technique based on regression algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A reliable unicast routing protocol for mobile ad hoc network by Sargolzaey, Hadi

    Published 2013
    “…It is also shown that the algorithm contributed greatly to reducing control overhead and although we have extra control packets overhead due to the cluster formation and maintenance, we see 27% to 38% control packets overhead reduction in different network conditions.…”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…Another prominent approach is the Dominant Pruning (DP) which is a distributed dominating set algorithm developed to alleviate the impact of flooding in mobile ad-hoc networks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14