Search Results - (( based detection method algorithm ) OR ( mobile information systems algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.] by Ahmad, Illiasaak, Anak Buja, Alya@Geogiana, Abdullah Sani, Anis Shobirin

    Published 2013
    “…Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
    Get full text
    Get full text
    Research Reports
  4. 4

    Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion by Alam, Mir Suhail, Morshidi, Malik Arman, Gunawan, Teddy Surya, Olanrewaju, Rashidah Funke, Arifin, Fatchul

    Published 2021
    “…After extensive experiments, the validity of the proposed method was superior to the existing vision-based pose estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
    Get full text
    Get full text
    Article
  6. 6

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning by Chimeleze C., Jamil N., Ismail R., Lam K.-Y., Teh J.S., Samual J., Akachukwu Okeke C.

    Published 2023
    “…Android (operating system); Android malware; Classification (of information); Feature Selection; Learning systems; Mobile security; Android apps; Classification models; Feature weight; Features selection; Machine learning algorithms; Machine-learning; Malware detection; Malwares; Memory usage; Selection techniques; Learning algorithms…”
    Article
  9. 9

    Genetic case-based reasoning for improved mobile phone faults diagnosis by Mohammed, Mazin Abed, Abd Ghani, Mohd Khanapi, Arunkumar, N., Obaid, Omar Ibrahim, A. Mostafa, Salama, Musa Jaber, Mustafa, Burhanuddin, M.A., Mohammed Matar, Bilal, Abdullatif, Saif Khalid, Ahmed Ibrahim, Dheyaa

    Published 2018
    “…Therefore, further investigation of the retrieval and revision mechanisms of CBR is essential in improving the diagnosis accuracy and precision of the method. This study proposes a hybrid scheme that combines the genetic algorithm and CBR (GCBR) to improve CBR diagnosis. …”
    Get full text
    Get full text
    Article
  10. 10

    Wifi positioning system / Amalina Abdul Halim by Abdul Halim, Amalina

    Published 2006
    “…This paper present the experimental results that demonstrate the ability of Wifi Positioning system to estimate location of the devices using K-NN algorithm and result in application part is shown based on highest percentage accuracy of time taken to intend bus stop.…”
    Get full text
    Student Project
  11. 11

    Empirical study on intelligent android malware detection based on supervised machine learning by Abdullah, Talal A.A., Ali, Waleed, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2020
    “…However, the most recent Android malware apps, such as zero-day, cannot be detected through conventional methods that are still based on fixed signatures or identifiers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A novel bio-inspired routing algorithm based on ACO for WSNs by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2019
    “…A novel approach of ant colony optimization (ACO) algorithm for discovering the optimum route for information transmission in the WSNs is proposed here for optimization and enhancement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces by A. Mostafa, Salama, Ravi, Sharran, Zebari, Dilovan Asaad, Zebari, Nechirvan Asaad, Mohammed, Mazin Abed, Nedoma, Jan, Martinek, Radek, Deveci, Muhammet, Ding, Weiping

    Published 2024
    “…Addressing these challenges entails an efficient and robust object detection and recognition algorithm. This algorithm can deal with a crowd of multiple faces via a mobile camera carried by a mini drone, and performs realtime video processing. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Efficient NASNetMobile-enhanced Vision Transformer for weakly supervised video anomaly detection by Arif Mohamad, Muhammad Luqman, Abd Rahman, Mohd Amiruddin, Mohd Shah, Nurisya, Kumar Sangaiah, Arun

    Published 2026
    “…Current video anomaly detection (VAD) methods struggle to prioritize informative frames and lack effective mechanisms to collect both local and global video contexts. …”
    Get full text
    Get full text
    Article
  15. 15

    Design and development of IP based automotic bottle inspection system using controllino maxi automation / Abdul Aziz Ahmed Siyad by Abdul Aziz , Ahmed Siyad

    Published 2019
    “…In order to improve the quality of the line this study proposes Automatic vision inspection machine that contains vision inspection part and conveyor line implemented using Controllino PLC and Omron photo-electric sensors and Mobile camera. Stream of real-time videos is acquired from the camera to Matlab using wireless network, there were methods and algorithms used in the vision inspection to analyse and detect the presence and properties of a bottle then extract meaningful information using Graphical User Interface, Noise or unwanted objects were mostly removed using filtering, segmentation and blob analyses. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Applying Bayesian probability for Android malware detection using permission features by Sharfah Ratibah, Tuan Mat, Mohd Faizal, Ab Razak, Mohd Nizam, Mohmad Kahar, Juliza, Mohamad Arif, Azlee, Zabidi

    Published 2021
    “…This paper proposes a malware detection system based on permission features using Bayesian probability to battle the malware issue. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  18. 18

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Nowadays, fingerprinting based Wi-Fi positioning systems successfully provide location information to mobile users. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…The temporal micro cluster data structure is proposed in CC_TRS algorithm to store the summarized information for each group of similar segments. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks by Solouk, Vahid

    Published 2009
    “…As for the first component, a link layer mechanism with the notion of a selection algorithm based on weighted mean is primarily introduced for collecting link layer information and discovering the candidate access router. …”
    Get full text
    Get full text
    Thesis