Search Results - (( mobile detection a algorithm ) OR ( user identification _ algorithm ))

Refine Results
  1. 1

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…This algorithm developed to allow user to receive push notification effectively based on the location of user’s smartphone that can be detected by Bluetooth Smart Ready Technology (BLE). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Convolutional neural network based mobile application for poisonous mushroom detection by Amirul, Shazlin Nizam, Mohd Sabri, Norlina, Gloria, Jennis Tan, Redwan, Nurul Ainina, Zhiping, Zhang

    Published 2025
    “…The application leverages a Convolutional Neural Network (CNN) algorithm to accurately classify mushrooms based on user-submitted images. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…It differs from other existing content negotiation approaches by introducing the idea of combining dynamic and static device capabilities detection methods. It consists of a device database and two processing components: (1) device identification module and (2) device capabilities detection module. …”
    Get full text
    Get full text
    Thesis
  5. 5

    MalDroid: Secure DL-enabled intelligent malware detection framework by Ikram Ul Haq, Tamim Ahmed Khan, Adnan Akhunzada, Xuan Liu

    Published 2021
    “…A novel and highly proficient Cuda-enabled multi-class malware threat detection and identification Deep Learning (DL)-driven mechanism that leverages ConvLSTM2D and CNN has been proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  8. 8

    GuitarApprentice: A Mobile Application for Acoustic Guitar Learning using Fast Fourier Transform algorithm by Lau , Jason Kim Wee

    Published 2013
    “…The results of the project are the suitable algorithm for chords detection and prototype of the mobile app. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Mobile Ad hoc Networks (MANETs) is a self-configuring network that is formed automatically by a collection of mobile nodes. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…This thesis presents a research whose objective is to design an intrusion detection model for Mobile Ad hoc NETworks (MANET). …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm by Rahman, MZA, Madihah Mohd Saudi

    Published 2024
    “…Therefore in this research paper, a systematic analysis on mobile botnet detection techniques is further investigated and evaluated. …”
    Proceedings Paper
  16. 16
  17. 17
  18. 18

    Collaborative Location-Based Mobile Game with Error Detection Algorithm by Adrus, Mohamad Tazuddin, Wong, Ming Ming, Abang Mohamad Aizuddin, Abang Mohd Mohtar

    Published 2018
    “…The game takes advantage of the weakness of Wi-Fi localization where environmental influence is significant and makes it part of the gameplay. A simple error detection algorithm is also introduced to maximize the game playability value by balancing game responsiveness and accuracy level.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20