Search Results - (( mobile detection _ algorithm ) OR ( panel notification based algorithm ))

Refine Results
  1. 1
  2. 2

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    GuitarApprentice: A Mobile Application for Acoustic Guitar Learning using Fast Fourier Transform algorithm by Lau , Jason Kim Wee

    Published 2013
    “…The results of the project are the suitable algorithm for chords detection and prototype of the mobile app. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…This thesis presents a research whose objective is to design an intrusion detection model for Mobile Ad hoc NETworks (MANET). …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm by Rahman, MZA, Madihah Mohd Saudi

    Published 2024
    “…Furthermore, this paper also discusses the challenges and the potential research for future work with relate of the genetic algorithm. This research paper can be used as a reference and guidance for further study on mobile botnet detection techniques.…”
    Proceedings Paper
  11. 11

    Automated feature selection using boruta algorithm to detect mobile malware by Che Akmal, Che Yahaya, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Ernawan, Ferda, Mohd Faizal, Ab Razak

    Published 2020
    “…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Collaborative Location-Based Mobile Game with Error Detection Algorithm by Adrus, Mohamad Tazuddin, Wong, Ming Ming, Abang Mohamad Aizuddin, Abang Mohd Mohtar

    Published 2018
    “…The game takes advantage of the weakness of Wi-Fi localization where environmental influence is significant and makes it part of the gameplay. A simple error detection algorithm is also introduced to maximize the game playability value by balancing game responsiveness and accuracy level.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Range sensor based local path planning algorithm for mobile robot in unknown static environment with beacon / Wan Ahmad Jailani Wan Ngah by Wan Ngah, Wan Ahmad Jailani

    Published 2013
    “…The Bug algorithm is a local path planning methodology for mobile robot which detects the nearest obstacle as the robot moves towards a target with no or very limited information about the environment. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…This new classification can be used as the input for mobile botnet detection for future work, especially for financial matters.…”
    Proceedings Paper
  19. 19

    Detecting resource consumption attack over MANET using an artificial immune algorithm by Abdelhaq, Maha, Hassan, Rosilah, Ismail, Mahamod, Israf Ali, Daud Ahmad

    Published 2011
    “…This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20