Search Results - (( based detection system algorithm ) OR ( phone application use algorithm ))*
Search alternatives:
- system algorithm »
- application use »
- use algorithm »
-
1
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…To solve this issue, we proposed a method to help the cloud provides a suitable content for devices. Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
3
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
4
Android malware detection using permission based static analysis
Published 2023“…Android is a mobile operating system that is the most used on smart mobile phones. …”
Get full text
Get full text
Article -
5
Android malware detection using permission based static analysis
Published 2024“…Android is a mobile operating system that is the most used on smart mobile phones. …”
Get full text
Get full text
Article -
6
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…My Ph.d is focusing on constructing a detection system of malicious spam email and DDoS attack using a large number of dataset which are obtained by a server that collect double-bounce email and darknet for malicious spam email detection system and DDoS backscatter detection system, respectively. …”
Get full text
Get full text
Thesis -
7
Development of eCall for Malaysia's automotive industries
Published 2019“…For the collision detection, algorithm has been developed based on the data acquired from gyroscope and accelerometer. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Qiblah direction: An android application
Published 2023“…The detection then will lead to the NORTH direction. Using the manual compass calculation (NORTH and scale of the current location) as the algorithm, the manual checking of compass will be transform to the automated Qiblah direction. …”
Article -
9
Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication
Published 2013“…This system involves the detection of fault connected to the microcontroller(PIC18F77A) and GSM modem. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Moving camera automatic number plate recognition using neural network in android platform
Published 2019“…Automatic number plate recognition (ANPR) system has been widely used in many applications such as electronic payment gateway system, parking fee payment system, road monitoring system and traffic control system, as named a few. …”
Get full text
Get full text
Get full text
Thesis -
12
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
13
Machine learning algorithms in context of intrusion detection
Published 2016“…Design of efficient, accurate, and low complexity intrusion detection system is a challenging task. Intrusion detection method is a core of intrusion detection system and it can be either signature based or anomaly based. …”
Get full text
Get full text
Conference or Workshop Item -
14
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
16
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
17
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
Get full text
Get full text
Final Year Project -
18
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
20
Embedded system based driver drowsiness detection system
Published 2023“…This paper presents a System-on-Chip (SoC) visual-based driver drowsiness detection system. …”
Conference paper
