Search Results - (( its applications mobile algorithm ) OR ( _ application learning algorithm ))*
Search alternatives:
- application learning »
- applications mobile »
- learning algorithm »
- its applications »
- mobile algorithm »
-
1
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
2
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
3
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
4
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
Get full text
Get full text
Get full text
Thesis -
5
Age And Gender Recognition Mobile App
Published 2023“…Therefore, this study aimed to develop age and gender recognition mobile application using deep learning algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
Get full text
Get full text
Get full text
Thesis -
7
“myHerbs”: A mobile based application for herbal leaf recognition using sift / Nur Nabilah Abu Mangshor …[et al.]
Published 2020“…In addition, it also contributes to the exploration and implementation of learning algorithm in mobile-based application.…”
Get full text
Get full text
Get full text
Article -
8
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017Get full text
Get full text
Final Year Project -
9
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. …”
Get full text
Get full text
Article -
10
Mobility-aware Offloading Decision For Multi-access Edge Computing In 5g Networks
Published 2024journal::journal article -
11
Design and Implementation of a Robot for Maze-Solving using Flood-Fill Algorithm
Published 2012Get full text
Get full text
Get full text
Citation Index Journal -
12
-
13
Home intruder detection system using machine learning and IoT
Published 2022“…HIDES successfully achieves its objective in detecting persons precisely and alerting the detection to users through mobile application remotely. …”
Get full text
Get full text
Get full text
Article -
14
DESIGN OF IMPROVED GRID FOR TURTLE ROBOT
Published 2013Get full text
Get full text
Final Year Project -
15
Detection of Malaysian sign language with single shot detector algorithm/ Nurfarah Idayu Mohamad Fauzi, Shahirah Mohamed Hatim and Zalikha Zulkifli
Published 2023“…Single Shot Detector (SSD) algorithm was implemented to perform the Malaysian Sign Language object detection in the application. …”
Get full text
Get full text
Get full text
Article -
16
-
17
A framework of modified adaptive neuro-fuzzy inference engine
Published 2012“…The performance of MANFIE was compared with existing methods in a diversity of practical benchmark applications such as pattern classifications, time series predictions, modeling with inverse learning control and mobile robot navigation. …”
Get full text
Get full text
Thesis -
18
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
19
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
20
A Static Approach towards Mobile Botnet Detection
Published 2016“…In this study we propose a static approach towards mobile botnet detection. This technique combines MD5, permissions, broadcast receivers as well as background services and uses machine learning algorithm to detect those applications that have capabilities for mobile botnets. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
