Search Results - (( its application using algorithm ) OR ( mobile application bayes algorithm ))

Refine Results
  1. 1
  2. 2

    Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia by Misinem, ., Tri Basuki, Kurniawan, Mohd Zaki, Zakaria, Muhammad Aqil Azfar, Uzailee

    Published 2022
    “…A service offered by a bank or other financial institution that enables its users to execute financial transactions remotely using a mobile device, such as a smartphone or tablet, is known as mobile banking. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Android malware detection using permission based static analysis by Mohd Ariffin, Noor Afiza, Casinto, Hanna Pungo

    Published 2024
    “…Android is a mobile operating system that is the most used on smart mobile phones. …”
    Get full text
    Get full text
    Article
  7. 7

    Android malware detection using permission based static analysis by Mohd Ariffin, Noor Afiza, Casinto, Hanna Pungo

    Published 2023
    “…Android is a mobile operating system that is the most used on smart mobile phones. …”
    Get full text
    Get full text
    Article
  8. 8

    Mobile application: coin identification using machine learning / Dania Qistina Mohd Nazly by Mohd Nazly, Dania Qistina

    Published 2021
    “…In methodology, the design and application architecture take place to determine the optimal model to deploy it in the mobile application. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Color Image Segmentation Based on Bayesian Theorem for Mobile Robot Navigation by Rahimizadeh, Hamid

    Published 2009
    “…The experimental results show the proposed algorithm is simple and robust, for real time application on vision based mobile robot for navigation, in spite of presence of other shapes and colors in the environment …”
    Get full text
    Get full text
    Thesis
  10. 10

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…The evolution of the Internet of things (IoT) has made a significant impact and availed opportunities for mobile device usage on human life. Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Applying Bayesian probability for Android malware detection using permission features by Sharfah Ratibah, Tuan Mat, Mohd Faizal, Ab Razak, Mohd Nizam, Mohmad Kahar, Juliza, Mohamad Arif, Azlee, Zabidi

    Published 2021
    “…By using static analysis, this study focuses on permission features that are significant in Android applications. The experiments conducted using chi-square as an algorithm and Naïve Bayes as a classifier. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Banana recognition system using convolutional neural network / Mohamad Shafiq Rosli by Rosli, Mohamad Shafiq

    Published 2021
    “…Most of the human work has been replaced by computers in recent years. With the rise of mobile technology and internet access, recent development in machine learning have designed many algorithms to solve diverse human problems. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Hotel recommendation system using machine learning by Wong, Wai On

    Published 2025
    “…The future work includes expanding the dataset, refining the recommendation algorithm, using natural language processing techniques with the addition of multilingual reviews, and deploying the system as a user-friendly application or mobile application.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Empirical study on intelligent android malware detection based on supervised machine learning by Abdullah, Talal A.A., Ali, Waleed, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2020
    “…The increasing number of mobile devices using the Android operating system in the market makes these devices the first target for malicious applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Structural Equation Modeling Algorithm and Its Application in Business Analytics by Sorooshian, Shahryar

    Published 2017
    “…Novelty of this article is in modified steps of SEM application in modeling strategies, also in its developed practical comprehensive SEM application flowchart This article is a roadmap for business advisors and those scholars trying to compute SEM for their decision making, complex modeling and data analysis programming, …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  16. 16

    Fast decryption method for a Rabin primitive-based cryptosystem by Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal

    Published 2014
    “…The Chinese Remainder Theorem (CRT) is an algorithm for solving linear congruence system into a unique representation and has been a useful tool in applications of cryptography. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Orthogonal least square algorithm and its application for modelling suspension system by Ahmad, Robiah, Jamaluddin, Hishamuddin

    Published 2001
    “…The derivation of the algorithm is presented and its application to the modelling of a car suspension system is included to demonstrate the effectiveness of the algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Schelkunoff array synthesis methods using adaptive-iterative algorithm by Abdul Latiff, Nurul Mu'azzah

    Published 2003
    “…By the co-emergence of these algorithms, a better performance and wider application are hoped to be achieved since each of these algorithms has its own advantages respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Bees algorithm for Forest transportation planning optimization in Malaysia by Jamaluddin, Jamhuri, Kamarudin, Norizah, Ismail, Mohd Hasmadi, Ahmad, Siti Azfanizam

    Published 2021
    “…Algorithm is widely used in various areas due to its ability to solve classes of problems. …”
    Get full text
    Get full text
    Article