Search Results - (( developing flood detection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- developing flood »
- java implication »
- flood detection »
-
1
Cars detection in stitched image using morphological approach
Published 2017“…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
2
SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan
Published 2018“…The core detection and prevention algorithm which is the support vector machine (SVM) were implemented in this project. …”
Get full text
Get full text
Student Project -
3
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Development of river water level estimation from surveillance cameras for flood monitoring system using deep learning techniques
Published 2022“…By integrating the estimated water level with a 3D model developed from LiDAR data, flood simulation was performed. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
Decision support system for optimal design and operation of ponds for watershed runoff management
Published 2010“…With climate change and rapid land development the extremes in occurrence of floods and droughts are inevitable. …”
Get full text
Get full text
Thesis -
8
Composite Drilling Monitoring System
Published 2019“…Then, the images taken undergo image pre-processing and further analyse to detect wear by image fusion method. During the image pre-processing, the true colour image is converted into binary images and canny edge detector is applied to detect the flank boundary. …”
Get full text
Get full text
Monograph -
9
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
10
Google the earth: what's next?
Published 2010“…The scientific challenge is to develop retrieval algorithms that describe the physical measurement process in sufficient detail, yet are simple enough to allow robust inversion of the remotely sensed signals. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
11
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…As a result, developing an efficient controller-agnostic network intrusion-detection method is imperative. …”
Get full text
Get full text
Thesis
