Search Results - (( mobile applications new algorithm ) OR ( its application learning algorithm ))*

Refine Results
  1. 1
  2. 2

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
    Proceedings Paper
  3. 3

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions by Goh, Kwang Yi, Baharom, Salmi, Din, Jamilah

    Published 2022
    “…Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    A Static Approach towards Mobile Botnet Detection by Shahid, Anwar, Jasni, Mohamad Zain, Inayat, Zakira, Ul Haq, Riaz, Ahmad, Karim, Jaber, Aws Naser

    Published 2016
    “…In this study we propose a static approach towards mobile botnet detection. This technique combines MD5, permissions, broadcast receivers as well as background services and uses machine learning algorithm to detect those applications that have capabilities for mobile botnets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al... by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  12. 12
  13. 13

    A new efficient checkpointing algorithm for distributed mobile computing by Mansouri, Houssem, Badache, Nadjib, Aliouat, Makhlouf, Pathan, Al-Sakib Khan

    Published 2015
    “…Such instability poses serious challenge for fault tolerant distributed mobile applications. Therefore, the classical checkpointing techniques, which make the applications more failure-resistant, are not always compatible with the mobile context. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Graphical user interface test case generation for android apps using Q-learning / Husam N. S. Yasin by Husam , N. S. Yasin

    Published 2021
    “…Software testing is an effective means for assuring the quality of applications. Android applications (or mobile apps) have become an essential part of our daily life. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…This thesis proposes a Case-Based Reasoning model for medical diagnosis,particularly for Thalassaemia diagnosis. CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…This is a new solution meant for a mobile node that might be utilising applications that may not be interrupted when the mobile node moves from one link to another. …”
    Get full text
    Get full text
    Thesis