Search Results - (( based application use algorithm ) OR ( phone application among algorithms ))*
Search alternatives:
- based application »
- phone application »
- application among »
- among algorithms »
- application use »
- use algorithm »
-
1
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
2
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
3
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…Most of the proposed solutions focused only on the Desktop versions of web applications and overlooked the mobile versions. Increasing use of mobile phones to access web applications increases the threat of cross-site scripting attacks on mobile phones. …”
Get full text
Get full text
Get full text
Article -
4
Development of eCall for Malaysia's automotive industries
Published 2019Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
Content-based indexing of low resolution documents
Published 2016“…This approach, which is signature-based are considered for fast and efficient matching to fulfil the needs of real-time applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Among the applications that are usually being used by almost Internet users and also are often misused by cyber criminals are email and websites. …”
Get full text
Get full text
Thesis -
8
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
9
Deterministic phase sequence approach for peak to average power ratio reduction in orthogonal frequency division multiplexing systems
Published 2016“…The first proposed method, called Gray Code-based Phase sequence (GCP) is a new low complexity PAPR reduction scheme based on a Gray code structure and a similarity measurement block; included on two steps: firstly, selecting the phase sequences based on Gray codes and finally, evaluating the similarity between the input and the output of the Power Amplifier (PA), among the selected phase sequences in the previous step. …”
Get full text
Get full text
Thesis -
10
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
11
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Based on the theoretical and fundamental research analysis the FUHS16 and UHDS16 algorithms using 16 × 16 block-based motion estimation formulations were developed. …”
Get full text
Get full text
Get full text
Book Chapter -
12
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
14
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…The purpose of this project is to implement FPGA Base Encryption Chip using DES algorithm. Throughout the project, the suitability of the implementation DES algorithm in FPGA will be investigated. …”
Get full text
Get full text
Monograph -
15
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
16
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION
Published 2006“…In order to overcome latency problem, this research is an attempt to suggest a new prediction algorithm based on heuristic that could be used to develop a more effective and general system for virtual training applications. …”
Get full text
Get full text
Thesis -
18
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
19
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…The algorithms work by arranging parameters using finite field group in elliptic curve E. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis
