Search Results - (( mobile detection a algorithm ) OR ( based replication ((bat algorithm) OR (based algorithm)) ))*

Refine Results
  1. 1

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…The three main objectives are: (i) to develop a malware RGB image-based dataset and classifier using a parallel CNN (PCNN), (ii) to develop an enhanced parallel deep learning (EPDL) model for malware detection (MD) and build a response system (RS) by applying PCNN, and (iii) to evaluate the developed model with previous studies based on the accuracy rate. …”
    thesis::doctoral thesis
  2. 2

    Relationship based replication algorithm for data grid by Yusof, Yuhanis

    Published 2014
    “…The Relationship based Replication algorithm aims to improve the Data Grid performance by reducing the job execution time, bandwidth and storage usage.The RBR was realized using a network simulation (OptorSim) and experiment results revealed that it offers better performance than existing replication algorithms.…”
    Get full text
    Get full text
    Monograph
  3. 3

    Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud by Aldailamy, Ali Y., Muhammed, Abdullah, Latip, Rohaya, Hamid, Nor Asilah Wati Abdul, Ismail, Waidah

    Published 2024
    “…The second algorithm is Dynamic Exponential Time (DET) which determines the data object replication and placement based on exponential time periods. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    An adaptive data replication and placement for efficient data storage of online social networks using two-tier multi-cloud environment by Al-Dailamy, Ali Y., Muhammed, Abdullah, Latip, Rohaya, Abdul Hamid, Nor Asila Wati, Esmail, Waidah

    Published 2022
    “…The second algorithm is Dynamic Exponential Time (DET) which determines the data object replication and placement based on exponential time periods. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  8. 8

    GuitarApprentice: A Mobile Application for Acoustic Guitar Learning using Fast Fourier Transform algorithm by Lau , Jason Kim Wee

    Published 2013
    “…The results of the project are the suitable algorithm for chords detection and prototype of the mobile app. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Mobile Ad hoc Networks (MANETs) is a self-configuring network that is formed automatically by a collection of mobile nodes. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR) by Noraziah, Ahmad, Abdalla, Ahmed N., Beg, Abul Hashem

    Published 2013
    “…It achieves faster time execution and cost minimization than that other replication processes. This algorithm also introduces a multi thread based persistence layer, which supports early binding and parallel connection to the servers. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…This thesis presents a research whose objective is to design an intrusion detection model for Mobile Ad hoc NETworks (MANET). …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Dynamic replication algorithm in data grid: Survey by K. Madi, Mohammed, Hassan, Suhaidi

    Published 2008
    “…A dynamic replication model based on mathematical concepts is proposed. …”
    Get full text
    Get full text
    Get full text
    Book Section
  15. 15

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm by Rahman, MZA, Madihah Mohd Saudi

    Published 2024
    “…Therefore in this research paper, a systematic analysis on mobile botnet detection techniques is further investigated and evaluated. …”
    Proceedings Paper
  18. 18
  19. 19

    Efficient multi-cloud storage using online dynamic replication and placement algorithms for online social networks by Aldailamy, Ali Y., Muhammed, Abdullah, Abdul Hamid, Nor Asilah Wati, Latip, Rohaya, Ismail, Waidah

    Published 2024
    “…The DTS algorithm establishes the replication and placement of objects using deterministic time slots, while the RTS algorithm is based on randomized time slots. …”
    Get full text
    Get full text
    Article
  20. 20