Search Results - (( based applications usage algorithm ) OR ( its applications new algorithm ))
Search alternatives:
- based applications »
- applications usage »
- its applications »
- applications new »
- usage algorithm »
- new algorithm »
-
1
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
2
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
3
-
4
-
5
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
6
Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah
Published 2021“…Following the application of a new methodology on the real site, the result indicated the consistency of DTM values of all the algorithms at different flying heights but there were relatively small differences between all the algorithms used. …”
Get full text
Get full text
Thesis -
7
Inverse kinematic solution in handling 3R manipulator via real-time genetic algorithm
Published 2023“…The Artificial Intelligence (AI) machine usage examines various benefits of its applications in industries. …”
Conference paper -
8
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…This thesis demonstrates that the dynamic consolidations of virtualmachines in cloud data centers by proposing energy efficient algorithms and policies. The aim of this research is to propose a few new host overload detection and VMselection algorithms in order tominimize energy consumption. …”
Get full text
Get full text
Thesis -
9
Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din
Published 2016“…Hence, this study proposes a new algorithm called Multi-Tier Protocol (MAP). …”
Get full text
Get full text
Thesis -
10
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…Popularity of P2P applications usage; majorly on file-sharing and video streaming has gained vast popularity and so rapid which wake up network service providers of its dominance. …”
Get full text
Get full text
Thesis -
11
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
SYSTEMATIC DESIGN ALGORITHM FOR ENERGY EFFICIENT AND COST EFFECTIVE HYDROGEN PRODUCTION FROM PALM WASTE
Published 2012“…Despite these potentials, its application at industrial scale is limited due to the energy intensiveness, costs and hazards of gasification process at high temperatures (>823K). …”
Get full text
Get full text
Thesis -
14
Ant-based vehicle congestion avoidance framework using vehicular networks / Mohammad Reza Jabbarpour Sattari
Published 2015“…AVCAF collects real-time traffic data through vehicular networks to consider non-recurring congestion conditions in its routing mechanism via ant-based algorithm. The proposed framework is evaluated and validated through simulation environment. …”
Get full text
Get full text
Thesis -
15
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
Published 2005“…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
Get full text
Get full text
Get full text
Article -
16
Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment
Published 2016“…Hence, the developed techniques and algorithms have high potential to be implemented in various commercial mobile robotic applications, which utilize VO for improved accuracy, efficiency, and cost effectiveness.…”
Get full text
Get full text
Thesis -
17
An efficient unknown detection approach for RFID data stream management system
Published 2025“…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Automatic Number Plate Recognition By Using Matlab
Published 2018Get full text
Get full text
Monograph -
20
Experiment with Text Summarization as a Positive Hierarchical Fuzzy Logic Ranking Indicator for Domain Specific Retrieval of Malay Translated Hadith
Published 2024journal::journal article
