Search Results - ((detection algorithm) OR (((section algorithm) OR (connection algorithm))))

Refine Results
  1. 1

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…It does not utilize any token, that is similar to permission-based, and the latest node having the critical section influences the entrance of the next node to the critical section, that is similar to token-based algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Efficient 3D stereo vision stabilization for multi-camera viewpoints by Bhuiyan, Sharif Shah Newaj, Khalifa, Othman Omran

    Published 2019
    “…Then improved the connectivity of correct matching pairs by minimizing the global error using spanning tree algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Implement edge pruning to enhance attack graph generation using the naïve approach algorithm by Al-Araji, Zaid J., Mutlag, Ammar Awad, Syed Ahmad, Sharifah Sakinah

    Published 2024
    “…For this issue, this study proposes using the naïve approach prune algorithm and using Personal agents to reduce the reachability time in calculating between the nodes and to remove unnecessary edges, minimizing the attack graph’s complexity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Intelligent failure connection algorithm for detecting internet worms by M. Rasheed, Mohammad, Md Norwawi, Norita, Ghazali, Osman, M. Kadhum, Mohammed

    Published 2009
    “…In this paper, we show that our algorithm can detect new types of worms. This paper shows that intelligent Failure Connection Algorithm (IFCA) operation is faster than traditional algorithm in detecting worms.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Detecting rogue access point (RAP) using simple network management protocol (SNMP) by Ahmad, Amran, Hassan, Suhaidi

    Published 2008
    “…We do a preliminary study using SNMP focusing on analyzing traffic analysis as a part of detecting RAP. We also propose a simple algorithm which is hope can detect RAP in advance before it vulnerable the network environment.…”
    Get full text
    Get full text
    Get full text
    Book Section
  6. 6

    A traffic signature-based algorithm for detecting scanning internet worms by M. Rasheed, Mohammad, Ghazali, Osman, Md Norwawi, Norita, M. Kadhum, Mohammed

    Published 2009
    “…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor Actor Networks by Imran, Muhammad, Younis, Mohamed, Md Said, Abas, Hasbullah, Halabi

    Published 2010
    “…We present PCR, a hybrid novel distributed partitioning detection and connectivity restoration algorithm. It proactively identifies critical actors based on local topological information and designates appropriate backup nodes to handle their failure. …”
    Get full text
    Get full text
    Article
  8. 8

    Hybrid anti-islanding algorithm for utility interconnection of distributed generation by Abdolrasol, M.G.M., Mekhilef, Saad

    Published 2009
    “…This algorithm is based on two detection schemes; namely active and passive. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Signal detection algorithm for cognitive radio using singular value decomposition by Omar, Mohd Hasbullah, Hassan, Suhaidi, Amphawan, Angela, Awang Nor, Shahrudin

    Published 2011
    “…This paper highlights an algorithm for detecting the presence of wireless signal using the Singular Value Decomposition (SVD) technique.We simulated the algorithm to detect common digital signals in wireless communication to test the performance of the signal detector.The SVD-based signal detector was found to be more efficient in detecting a signal without knowing the properties of the transmitted signal.The performance of the algorithm is better compared to the favorable energy detection.The algorithm is suitable for blind spectrum sensing where the properties of the signal to be detected are unknown.This is also the advantage of the algorithm since any signal would interfere and subsequently affect the quality of service (QoS) of the IEEE 802.22 connection.Furthermore, the algorithm performed better in the low signalto-noise ratio (SNR) environment.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Improving The Algorithm To Detect Internet Worms by Rasheed, Mohmmad M

    Published 2008
    “…The aim of this project is to improved algorithm to detect internet worm by two sub algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Solving time gap problems through the optimization of detecting stepping stone algorithm by Omar, Mohd. Nizam, Maarof, Mohd. Aizaini, Zainal, Anazida

    Published 2004
    “…It is found that current algorithm of detecting stepping stone is not optimized. …”
    Get full text
    Get full text
    Book Section
  13. 13

    Eye closure and open detection using Adaptive Thresholding Histogram Enhancement (ATHE) technique and connected components utilisation by Mat Ibrahim, Masrullizam, Awang Md Isa, Azmi, Darsono, Abd Majid

    Published 2014
    “…Eye closure detection is an important operation prior to carry out the main algorithm such as iris recognition algorithms, and eye tracking algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…This study employs use Random Forest algorithm to identify and forecast attacks to dynamically locate the attack location in the network for attack graph analysis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Partitioning detection and connectivity restoration algorithm for WSAN by Muhammad, Imran, Md Said, Abas, Hasbullah, Halabi, Younis, Mohammed

    Published 2010
    “…This paper presents PCR, a novel distributed partitioning detection and connectivity restoration algorithm. PCR proactively identifies critical actors based on local topological information and designate appropriate backup nodes (preferably non-critical) to handle their failure. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
    Get full text
    Get full text
    Thesis
  18. 18

    A new corner detection algorithm for chain code representation. by Haron , Habibollah, Shamsuddin , Siti Mariyam, Mohamed, Dzulkifli

    Published 2005
    “…A new algorithm is proposed to detect a corner of a thinned binary image that is represented by an eight-connected contour chain code. …”
    Get full text
    Get full text
    Article
  19. 19

    Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin by Suhaimi, Hamizan, Suliman, Saiful Izwan, Musirin, Ismail

    Published 2021
    “…The combination of Genetic Algorithm, Immune Algorithm and local search has produced good detection with acuracy rate of 98.91% and has the potential to be further investigated for other research areas.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Server scanning worm detection by using intelligent failure connection algorithm by M. Rasheed, Mohammad, Ghazali, Osman, Md. Norwawi, Norita

    Published 2010
    “…Our proposal decreases the false alarm in Intelligent Failure Connection Algorithm (IFCA). Our proposal also works when the computer is infected by the worm and IFCDA detected the worm, many computers that are connected through the internet will receive the warning by using our proposal. …”
    Get full text
    Get full text
    Get full text
    Article