Search Results - (( mobile application use algorithm ) OR ( based detection system algorithm ))
Search alternatives:
- system algorithm »
- application use »
- based detection »
- use algorithm »
-
1
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…Moreover,this application will be using the programming language Visual Basic. …”
Get full text
Get full text
Undergraduates Project Papers -
2
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
3
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…These algorithms are used to secure both host-based and network-based systems. …”
Get full text
Get full text
Get full text
Article -
4
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
5
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…Moreover,this application will be using the programming language Visual Basic. …”
Get full text
Get full text
Undergraduates Project Papers -
6
AUTONOMOUS MOBILE ROBOT VISION BASED SYSTEM: HUMAN DETECTION BY COLOR
Published 2013“…There have two part are involve which is mobile robot platform and classification algorithms by color. …”
Get full text
Get full text
Article -
7
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
8
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
Get full text
Get full text
Get full text
Thesis -
9
Computing non-contactable drowsiness monitoring system with mobile machine vision
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Published 2024Article -
11
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…The algorithm used for feature detection and description is Oriented-FAST Rotated-BRIEF (ORB), whereas to evaluate the homography for pose estimation, Random Sample Consensus (RANSAC) is used. …”
Get full text
Get full text
Get full text
Article -
12
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
13
Hardware development of autonomous mobile robot based on actuating lidar
Published 2022“…From here, the extracted values are implied on k-NN, Decision Tree and CNN training algorithm. The final result shows promising potential with 91% prediction when implemented on the Decision Tree algorithm based on our proposed system of a single actuating LiDAR sensor.…”
Get full text
Get full text
Get full text
Article -
14
A real-time mobile notification system for inventory stock out detection using SIFT and RANSAC
Published 2020“…The proposed method is a machine learning based real-time notification system using the exciting Scale Invariant Feature Transform feature detector (SIFT) and Random Sample Consensus (RANSAC) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…Mobile ad-hoc network (MANET) is an evolving technology that is utilized in different applications (i.e. military surveillance, personal network, etc.) and developed in the recent years. …”
Get full text
Get full text
Get full text
Thesis -
16
Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli
Published 2018“…Moreover, the algorithm used for rule-based expert system is forward chaining method. …”
Get full text
Get full text
Student Project -
17
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…The result shows that the detection of malware within application category achieves higher accuracy compared to application with non-category based. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. Based on that analysis, this research suggests a hybrid algorithm: the Multi-Objective Optimisation Genetic Algorithm based on Adaptive Multi-Parent Crossover and Fuzzy Dominance (MOGA-AMPazy). …”
Get full text
Get full text
Get full text
Thesis -
19
A wheelchair sitting posture detection system using pressure sensors
Published 2024“…A graphical-user interface (GUI) based application was developed using the algorithm with the highest accuracy, DT classifier, to illustrate the result of the posture classification to the wheelchair user for any posture correction to be made in case of improper sitting posture detected.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…To solve this issue, we proposed a method to help the cloud provides a suitable content for devices. Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports
