Search Results - (( mobile application _ algorithm ) OR ( set detection based algorithm ))
Search alternatives:
- detection based »
- set detection »
-
1
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
2
Behavioural Feature Extraction For Context-Aware Traffic Classification Of Mobile Applications
Published 2018“…This thesis designed a context-aware traffic classification framework that includes a set of sequential algorithms from cleaning datasets, to identifying new features and detecting optimal classifier(s) based on problem contexts to improve classification accuracy in multi-variate traffic classification.…”
Get full text
Get full text
Thesis -
3
Electroencephalogram signal interpretation system for mobile robot
Published 2013“…After 30 GA runs, the optimal four sets of electrodes are chosen based on their coefficient of determination or r² values, where higher values contributes to higher repetition rates. …”
Get full text
Get full text
Thesis -
4
Mental stress classification based on selected EEG channels using Correlation Coefficient of Hjorth Parameters
Published 2023“…These findings strongly indicate that the CCHP algorithm shows great promise in the design of a wearable application for mental stress detection, utilizing a minimal number of EEG channels.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
Deep learning-based water segmentation for autonomous surface vessel
Published 2020“…Classical computer vision algorithms for detection holds limitation in robustness and scalability. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
A static analysis approach for android permission-based malware detection systems
Published 2021“…The performances of the different sets of classifiers were then compared. The results indicated that with a TPR value of 91.6%, the Random Forest algorithm achieved the highest level of accuracy in malware detection.…”
Get full text
Get full text
Get full text
Article -
7
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…In the online phase, the stream clustering algorithm for trajectories based on the lifespan of the cluster is proposed (CC_TRS) to overcome the limitations of the time window technique. …”
Get full text
Get full text
Thesis -
8
Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad
Published 2016“…Both models optimize acoustic features for source mobile device identification based on near-silent segments. The proposed feature sets along with selected feature extraction methods from the literature are analyzed and compared by using supervised learning techniques (i.e. support vector machines, nearest-neighbor, naïve Bayesian, neural network, logistic regression, and ensemble trees classifier), as well as unsupervised learning techniques (i.e. probabilistic-based and nearest-neighbor-based algorithms). …”
Get full text
Get full text
Thesis -
9
A deep Learning Approach to Malware detection in android platform
Published 2018“…The chosen approach will learn and train itself by using the features that are needed for malware detection using a large data sets for evaluating the trained algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
MENGKAJI TAHAP KESEDARAN METAKOGNISI PELAJAR TAHUN SATU SAINS KOGNITIF DI UNIMAS
Published 2018“…The chosen approach will learn and train itself by using the features that are needed for malware detection using a large data sets for evaluating the trained algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Self-organizing map approach for determining mobile user location using IEEE 802.11 signals
Published 2010“…This paper describes a study towards user location system based on Kohonen Self-Organizing Maps (SOM) algorithm for locating user location with the existing Wi-Fi signals. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…A Java-based robot development tool has been set up as alternative programming methods incorporating LeJos and the controller. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
An algorithm for Elliott Waves pattern detection
Published 2018“…The following application of the developed detection algorithm was based on recognition of an incomplete EW patterns with aim of the prediction of the following progress of the time set. …”
Get full text
Get full text
Article -
14
An algorithm for Elliott Waves pattern detection
Published 2018“…The following application of the developed detection algorithm was based on recognition of an incomplete EW patterns with aim of the prediction of the following progress of the time set. …”
Get full text
Get full text
Article -
15
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…As for the first component, a link layer mechanism with the notion of a selection algorithm based on weighted mean is primarily introduced for collecting link layer information and discovering the candidate access router. …”
Get full text
Get full text
Thesis -
16
Moving camera automatic number plate recognition using neural network in android platform
Published 2019“…This allow the implementation of ANPR system in mobile device is possible. Based on the literature review, there are several researches have implemented ANPR system in mobile platform, but most of the researches detect license plate from static image or directly pointing the phone camera to capture license plate image. …”
Get full text
Get full text
Get full text
Thesis -
17
Model-based hybrid variational level set method applied to lung cancer detection
Published 2024“…This paper presents a novel model-based hybrid variational level set method (VLSM) tailored for lung cancer detection. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
Published 2018“…Existing content-based methods for spam detection degraded in performance due to many factors. …”
Get full text
Get full text
Get full text
Thesis -
20
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014“…The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
