Search Results - (( based detection method algorithm ) OR ( mobile information systems algorithm ))*
Search alternatives:
- mobile information »
- systems algorithm »
- method algorithm »
- based detection »
-
1
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
2
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
3
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
4
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…After extensive experiments, the validity of the proposed method was superior to the existing vision-based pose estimation algorithms. …”
Get full text
Get full text
Get full text
Article -
5
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
Get full text
Get full text
Article -
6
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
7
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning
Published 2023“…Android (operating system); Android malware; Classification (of information); Feature Selection; Learning systems; Mobile security; Android apps; Classification models; Feature weight; Features selection; Machine learning algorithms; Machine-learning; Malware detection; Malwares; Memory usage; Selection techniques; Learning algorithms…”
Article -
9
Genetic case-based reasoning for improved mobile phone faults diagnosis
Published 2018“…Therefore, further investigation of the retrieval and revision mechanisms of CBR is essential in improving the diagnosis accuracy and precision of the method. This study proposes a hybrid scheme that combines the genetic algorithm and CBR (GCBR) to improve CBR diagnosis. …”
Get full text
Get full text
Article -
10
Wifi positioning system / Amalina Abdul Halim
Published 2006“…This paper present the experimental results that demonstrate the ability of Wifi Positioning system to estimate location of the devices using K-NN algorithm and result in application part is shown based on highest percentage accuracy of time taken to intend bus stop.…”
Get full text
Student Project -
11
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…However, the most recent Android malware apps, such as zero-day, cannot be detected through conventional methods that are still based on fixed signatures or identifiers. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
A novel bio-inspired routing algorithm based on ACO for WSNs
Published 2019“…A novel approach of ant colony optimization (ACO) algorithm for discovering the optimum route for information transmission in the WSNs is proposed here for optimization and enhancement. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces
Published 2024“…Addressing these challenges entails an efficient and robust object detection and recognition algorithm. This algorithm can deal with a crowd of multiple faces via a mobile camera carried by a mini drone, and performs realtime video processing. …”
Get full text
Get full text
Get full text
Article -
14
Efficient NASNetMobile-enhanced Vision Transformer for weakly supervised video anomaly detection
Published 2026“…Current video anomaly detection (VAD) methods struggle to prioritize informative frames and lack effective mechanisms to collect both local and global video contexts. …”
Get full text
Get full text
Article -
15
Design and development of IP based automotic bottle inspection system using controllino maxi automation / Abdul Aziz Ahmed Siyad
Published 2019“…In order to improve the quality of the line this study proposes Automatic vision inspection machine that contains vision inspection part and conveyor line implemented using Controllino PLC and Omron photo-electric sensors and Mobile camera. Stream of real-time videos is acquired from the camera to Matlab using wireless network, there were methods and algorithms used in the vision inspection to analyse and detect the presence and properties of a bottle then extract meaningful information using Graphical User Interface, Noise or unwanted objects were mostly removed using filtering, segmentation and blob analyses. …”
Get full text
Get full text
Get full text
Thesis -
16
Applying Bayesian probability for Android malware detection using permission features
Published 2021“…This paper proposes a malware detection system based on permission features using Bayesian probability to battle the malware issue. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
Get full text
Get full text
Get full text
Academic Exercise -
18
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Nowadays, fingerprinting based Wi-Fi positioning systems successfully provide location information to mobile users. …”
Get full text
Get full text
Conference or Workshop Item -
19
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The temporal micro cluster data structure is proposed in CC_TRS algorithm to store the summarized information for each group of similar segments. …”
Get full text
Get full text
Thesis -
20
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…As for the first component, a link layer mechanism with the notion of a selection algorithm based on weighted mean is primarily introduced for collecting link layer information and discovering the candidate access router. …”
Get full text
Get full text
Thesis
