Search Results - (( mobile application _ algorithm ) OR ( set detection based algorithm ))

Refine Results
  1. 1

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Behavioural Feature Extraction For Context-Aware Traffic Classification Of Mobile Applications by Aun, Yichiet

    Published 2018
    “…This thesis designed a context-aware traffic classification framework that includes a set of sequential algorithms from cleaning datasets, to identifying new features and detecting optimal classifier(s) based on problem contexts to improve classification accuracy in multi-variate traffic classification.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Electroencephalogram signal interpretation system for mobile robot by Hasan, Intan Helina

    Published 2013
    “…After 30 GA runs, the optimal four sets of electrodes are chosen based on their coefficient of determination or r² values, where higher values contributes to higher repetition rates. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Mental stress classification based on selected EEG channels using Correlation Coefficient of Hjorth Parameters by Hag, Ala, Fares, Al-Shargie, Handayani, Dini Oktarina Dwi, Houshyar, Asadi

    Published 2023
    “…These findings strongly indicate that the CCHP algorithm shows great promise in the design of a wearable application for mental stress detection, utilizing a minimal number of EEG channels.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Deep learning-based water segmentation for autonomous surface vessel by Mohd Adam, Muhammad Ammar, Ibrahim, Ahmad Imran, Zainal Abidin, Zulkifli, Mohd Zaki, Hasan Firdaus

    Published 2020
    “…Classical computer vision algorithms for detection holds limitation in robustness and scalability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    A static analysis approach for android permission-based malware detection systems by Juliza, Mohamad Arif, Mohd Faizal, Ab Razak, Suryanti, Awang, Sharfah Ratibah, Tuan Mat, Nor Syahidatul Nadiah, Ismail, Ahmad Firdaus, Zainal Abidin

    Published 2021
    “…The performances of the different sets of classifiers were then compared. The results indicated that with a TPR value of 91.6%, the Random Forest algorithm achieved the highest level of accuracy in malware detection.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…In the online phase, the stream clustering algorithm for trajectories based on the lifespan of the cluster is proposed (CC_TRS) to overcome the limitations of the time window technique. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad by Mehdi , Jahanirad

    Published 2016
    “…Both models optimize acoustic features for source mobile device identification based on near-silent segments. The proposed feature sets along with selected feature extraction methods from the literature are analyzed and compared by using supervised learning techniques (i.e. support vector machines, nearest-neighbor, naïve Bayesian, neural network, logistic regression, and ensemble trees classifier), as well as unsupervised learning techniques (i.e. probabilistic-based and nearest-neighbor-based algorithms). …”
    Get full text
    Get full text
    Thesis
  9. 9

    A deep Learning Approach to Malware detection in android platform by Corrine, Francis

    Published 2018
    “…The chosen approach will learn and train itself by using the features that are needed for malware detection using a large data sets for evaluating the trained algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10

    MENGKAJI TAHAP KESEDARAN METAKOGNISI PELAJAR TAHUN SATU SAINS KOGNITIF DI UNIMAS by SITI NORAINI, LABU

    Published 2018
    “…The chosen approach will learn and train itself by using the features that are needed for malware detection using a large data sets for evaluating the trained algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11

    Self-organizing map approach for determining mobile user location using IEEE 802.11 signals by Mantoro, Teddy, Ayu, Media Anugerah, Nuraini, Asma, Amin, Sulafa Mohd

    Published 2010
    “…This paper describes a study towards user location system based on Kohonen Self-Organizing Maps (SOM) algorithm for locating user location with the existing Wi-Fi signals. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…A Java-based robot development tool has been set up as alternative programming methods incorporating LeJos and the controller. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…The following application of the developed detection algorithm was based on recognition of an incomplete EW patterns with aim of the prediction of the following progress of the time set. …”
    Get full text
    Get full text
    Article
  14. 14

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…The following application of the developed detection algorithm was based on recognition of an incomplete EW patterns with aim of the prediction of the following progress of the time set. …”
    Get full text
    Get full text
    Article
  15. 15

    Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks by Solouk, Vahid

    Published 2009
    “…As for the first component, a link layer mechanism with the notion of a selection algorithm based on weighted mean is primarily introduced for collecting link layer information and discovering the candidate access router. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Moving camera automatic number plate recognition using neural network in android platform by Conny Liew

    Published 2019
    “…This allow the implementation of ANPR system in mobile device is possible. Based on the literature review, there are several researches have implemented ANPR system in mobile platform, but most of the researches detect license plate from static image or directly pointing the phone camera to capture license plate image. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Model-based hybrid variational level set method applied to lung cancer detection by Jing, Wang, Liew, Siau-Chuin, Azian, Abd Aziz

    Published 2024
    “…This paper presents a novel model-based hybrid variational level set method (VLSM) tailored for lung cancer detection. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah by Adewole Kayode, Sakariyah

    Published 2018
    “…Existing content-based methods for spam detection degraded in performance due to many factors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Experimenting the dendrite cell algorithm for disease outbreak detection model by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza

    Published 2014
    “…The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item