Search Results - (( mobile detection based algorithm ) OR ( a communication based algorithm ))

Refine Results
  1. 1

    Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm by Rahman, MZA, Madihah Mohd Saudi

    Published 2024
    “…A case study was carried out to reverse engineering the mobile botnet codes. Based on the findings, this mobile botnet has successfully posed itself as a fake anti-virus and has the capability to steal important data such as username and password from the Android-based devices. …”
    Proceedings Paper
  2. 2

    Smart and energy aware routing for the internet of mobile things by Beh, Zi Xuan

    Published 2021
    “…This can also be concluded that the SEA routing algorithm is smart and energy aware based on the results obtained.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…Token-based algorithms depend on circulation of a specific message known as token. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A study on obstacle detection for IoT based automated guided vehicle (AGV) by Loh, Jit Hao, M. Nafis, O. Z.

    Published 2022
    “…Therefore, an IoT system is developed to allow a flexible wireless communication among mobile robots in an indoor industrial environment. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.] by Ahmad, Illiasaak, Anak Buja, Alya@Geogiana, Abdullah Sani, Anis Shobirin

    Published 2013
    “…Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
    Get full text
    Get full text
    Thesis
  11. 11

    A noble approach of ACO algorithm for WSN by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2018
    “…Using the proposed ACO algorithm and considering both the node mobility and the existing energy of the nodes, an optimum route and best cost from the originating node to the target node can be detected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13

    Mobile Vision-based Automatic Counting of Bacteria Colonies by Jacey-Lynn, Minoi, Tin, Tze Chiang, Terrin, Lim

    Published 2017
    “…In this paper, we introduce a mobile based computer vision algorithm for automatic bacteria colony counting using morphological operations and transforms in image processing, on a custom Android mobile cross-platform open source software and written in Java, C++ and Open CV computer vision library. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…In this paper, focus is given on enhanced security scheme in terms of RO based Test-bed evaluation experiment. An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare a safe communication between MN and CN. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A novel bio-inspired routing algorithm based on ACO for WSNs by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2019
    “…The proposed algorithm has been simulated and verified using MATLAB and the simulation results demonstrate that new ACO based algorithm achieved improved performance, about 30% improvement compared with the traditional ACO algorithm, and faster convergence to determine the best cost route, and recorded an improvement in the energy consumption of the nodes per transmission.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An Efficient Route Selection Based on AODV Algorithm for VANET by Nassir Sallom , Kadhim, Mohammed, Muamer N., Mazlina, Abdul Majid, Sinan Q., Mohamd

    Published 2016
    “…Simulation result shown that VANET modified algorithm based on average signal strength has the advantage of choosing the optimum route to deliver data and own enhanced ratio (17%) by comparing with a maximum signal strength route.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An Efficient Route Selection based on AODV Algorithm for VANET by Kadhim, Nassir, Mohammed, Muamer N., Mazlina, Abdul Majid, Mohamd, Sinan Q., Tao, Hai

    Published 2016
    “…The accident detection system which based on Global Positioning System (GPS) and Global System for Mobile communication (GSM) can be accomplished though one or several sensors, the system can gather the information and coordinates of accident spot, then send this data to the rescue services center over a network link in the shortest time, In this paper, we propose an enhanced system that composed of a GPS receiver, Vibration sensor, GSM Modem and integrated with Vehicular AD-Hoc Network (VANET). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis