Search Results - (( its application learning algorithm ) OR ( mobile application a algorithm ))*
Search alternatives:
- application learning »
- learning algorithm »
- its application »
- application a »
- a algorithm »
-
1
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
2
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
3
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
4
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
Get full text
Get full text
Get full text
Thesis -
5
Age And Gender Recognition Mobile App
Published 2023“…In addition, the User Interface (UI) of the existing mobile app is unappealing. Therefore, this study aimed to develop age and gender recognition mobile application using deep learning algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
Get full text
Get full text
Get full text
Thesis -
7
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017Get full text
Get full text
Final Year Project -
8
“myHerbs”: A mobile based application for herbal leaf recognition using sift / Nur Nabilah Abu Mangshor …[et al.]
Published 2020“…In addition, it also contributes to the exploration and implementation of learning algorithm in mobile-based application.…”
Get full text
Get full text
Get full text
Article -
9
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…We utilise the Q-Learning algorithm to compare actions, including context-based actions, to effectively detect crashes and achieve a higher code coverage.…”
Get full text
Get full text
Article -
10
Design and Implementation of a Robot for Maze-Solving using Flood-Fill Algorithm
Published 2012Get full text
Get full text
Get full text
Citation Index Journal -
11
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
12
-
13
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
14
DESIGN OF IMPROVED GRID FOR TURTLE ROBOT
Published 2013Get full text
Get full text
Final Year Project -
15
-
16
Detection of Malaysian sign language with single shot detector algorithm/ Nurfarah Idayu Mohamad Fauzi, Shahirah Mohamed Hatim and Zalikha Zulkifli
Published 2023“…Single Shot Detector (SSD) algorithm was implemented to perform the Malaysian Sign Language object detection in the application. …”
Get full text
Get full text
Get full text
Article -
17
A framework of modified adaptive neuro-fuzzy inference engine
Published 2012“…The performance of MANFIE was compared with existing methods in a diversity of practical benchmark applications such as pattern classifications, time series predictions, modeling with inverse learning control and mobile robot navigation. …”
Get full text
Get full text
Thesis -
18
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…For future work, the prototype can be further enhanced as one of the mobile application. Moreover, this study can be further applied for a larger size of message context (instead of SMS that is limited to 160 characters) and also tested in other languages.…”
thesis::doctoral thesis -
19
A Static Approach towards Mobile Botnet Detection
Published 2016“…This technique combines MD5, permissions, broadcast receivers as well as background services and uses machine learning algorithm to detect those applications that have capabilities for mobile botnets. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter
