Search Results - (( developing flood detection algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan by Mazlan, Muhammad Muhaimin Aiman

    Published 2018
    “…The core detection and prevention algorithm which is the support vector machine (SVM) were implemented in this project. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Development of river water level estimation from surveillance cameras for flood monitoring system using deep learning techniques by Muhadi, Nur 'Atirah

    Published 2022
    “…By integrating the estimated water level with a 3D model developed from LiDAR data, flood simulation was performed. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Decision support system for optimal design and operation of ponds for watershed runoff management by Al-Ansi, Abdulwahab Mujahed Hasan

    Published 2010
    “…With climate change and rapid land development the extremes in occurrence of floods and droughts are inevitable. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Composite Drilling Monitoring System by Ruddin, Putri Annur Khaleeda Amer

    Published 2019
    “…Then, the images taken undergo image pre-processing and further analyse to detect wear by image fusion method. During the image pre-processing, the true colour image is converted into binary images and canny edge detector is applied to detect the flank boundary. …”
    Get full text
    Get full text
    Monograph
  9. 9
  10. 10

    Google the earth: what's next? by Mansor, Shattri

    Published 2010
    “…The scientific challenge is to develop retrieval algorithms that describe the physical measurement process in sufficient detail, yet are simple enough to allow robust inversion of the remotely sensed signals. …”
    Get full text
    Get full text
    Get full text
    Inaugural Lecture
  11. 11

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…As a result, developing an efficient controller-agnostic network intrusion-detection method is imperative. …”
    Get full text
    Get full text
    Thesis