Search Results - (( mobile detection means algorithm ) OR ( based replication laws algorithm ))*

Refine Results
  1. 1
  2. 2

    UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm by Wan Bejuri, Wan Mohd Ya'akob, Harun, Muhammad Harraz, Mohamad, Abdul Karim

    Published 2022
    “…The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…We consider two different pilot symbol assisted adaptive beamforming algorithms, Least Mean Square (LMS) and Recursive Least Square (RLS). …”
    Get full text
    Get full text
    Thesis
  6. 6

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The mean path cost generated by the LS algorithm, on the other hand, is 14% higher than that generated by the PRM. …”
    Get full text
    Thesis
  7. 7

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…Moreover, three proposed approaches for gateway discovery are implemented; propose a forwarding algorithm, and route determination algorithm for default route and host route in MANET are investigated.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Efficient NASNetMobile-enhanced Vision Transformer for weakly supervised video anomaly detection by Arif Mohamad, Muhammad Luqman, Abd Rahman, Mohd Amiruddin, Mohd Shah, Nurisya, Kumar Sangaiah, Arun

    Published 2026
    “…Second, we employed a pretrained, low-parameter NASNetMobile algorithm that efficiently extracts fine-grained local spatial details. …”
    Get full text
    Get full text
    Article
  9. 9

    A noble approach of ACO algorithm for WSN by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2018
    “…Using the proposed ACO algorithm and considering both the node mobility and the existing energy of the nodes, an optimum route and best cost from the originating node to the target node can be detected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    An active lower-extremity exoskeleton for synchronous mobility assistance in lifting and carrying manual handling task / Sado Fatai by Sado , Fatai

    Published 2019
    “…In this study, a new 12-DOF lower extremity EHPA called UMExoLEA (Universiti Malaya Exoskeleton for Lower Extremity Augmentation) with 4-active bi-directional brushless DC motor actuation and a novel synchronous mobility control algorithm are developed to provide smooth lower-extremity mobility augmentation in lifting/carrying MH works. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…Mobile Cloud Computing (MCC) is the combination of cloud computing, mobile computing, and wireless network to bring rich computational resources to mobile users, network operators, as well as cloud computing providers. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Bacterial image analysis using multi-task deep learning approaches for clinical microscopy by Chin, Shuang Yee, Jian, Dong, Khairunnisa, Hasikin, Romano, Ngui, Lai, Khin Wee, Pauline Yeoh, Shan Qing, Xiang, Wu

    Published 2024
    “…Methods Three object detection networks of DL algorithms, namely SSD-MobileNetV2, EfficientDet, and YOLOv4, were developed to automatically detect Escherichia coli (E. coli) bacteria from microscopic images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad by Mehdi , Jahanirad

    Published 2016
    “…The context model allows computing the mobile device intrinsic fingerprints for the source mobile device identification. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Obstacle avoidance robot using sonar sensor (OARuS) by Mohamad Sabri Abdullah

    Published 2008
    “…The obstacle-avoidance method is a means to avoid obstacles that exist within the correction area of groping locomotion by applying a suitable algorithm to the humanoid robot’s control system. …”
    Get full text
    Learning Object
  17. 17

    Automated Vehicle Classification (AVC) using machine learning implementation in Malaysia's toll system by Hassan, Raini, Mohd Ridzal, Aisyah Afiqah, Fadzleey, Nur Zulfah Insyirah

    Published 2024
    “…YOLOv8 exhibits superior performance with the highest MAP of 0.995 after fine-tuning compared to other models, demonstrating effectiveness in real-time object detection. The system employs a single detection process, ensuring only one vehicle is detected at a time, enhancing accuracy. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  18. 18
  19. 19

    Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks by Solouk, Vahid

    Published 2009
    “…As for the first component, a link layer mechanism with the notion of a selection algorithm based on weighted mean is primarily introduced for collecting link layer information and discovering the candidate access router. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication by Ab Ghani, Mohd Ruddin, Wan Hassan, Wan Ahmas Redhauddin, Mat Hanafiah, Mohd Ariff, Raman, Siti Hajar

    Published 2013
    “…This system involves the detection of fault connected to the microcontroller(PIC18F77A) and GSM modem. …”
    Get full text
    Get full text
    Conference or Workshop Item