Search Results - (( mobile detection method algorithm ) OR ( a selection based algorithm ))

Refine Results
  1. 1

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…In addition, the study suggests a promising potential of hybrid feature selection approach, diversity-based multiple classifier systems to improve mobile and wearable sensor-based human activity detection and health monitoring system. © 2019, The Author(s).…”
    Get full text
    Get full text
    Article
  4. 4

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Electroencephalogram signal interpretation system for mobile robot by Hasan, Intan Helina

    Published 2013
    “…Based on the analysis and optimization of the datasets, P300 signals are most clear and robust at the midline and parietal area of the scalp, and can be detected at around 500ms after a stimulus. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…In order to improve the detection rate of malicious application on the Android platform, a novel knowledge-based database discovery model that improves apriori association rule mining of a priori algorithm with Particle Swarm Optimization (PSO) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A novel bio-inspired routing algorithm based on ACO for WSNs by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2019
    “…A novel approach of ant colony optimization (ACO) algorithm for discovering the optimum route for information transmission in the WSNs is proposed here for optimization and enhancement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces by A. Mostafa, Salama, Ravi, Sharran, Zebari, Dilovan Asaad, Zebari, Nechirvan Asaad, Mohammed, Mazin Abed, Nedoma, Jan, Martinek, Radek, Deveci, Muhammet, Ding, Weiping

    Published 2024
    “…Addressing these challenges entails an efficient and robust object detection and recognition algorithm. This algorithm can deal with a crowd of multiple faces via a mobile camera carried by a mini drone, and performs realtime video processing. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks by Solouk, Vahid

    Published 2009
    “…As for the first component, a link layer mechanism with the notion of a selection algorithm based on weighted mean is primarily introduced for collecting link layer information and discovering the candidate access router. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A static analysis approach for android permission-based malware detection systems by Juliza, Mohamad Arif, Mohd Faizal, Ab Razak, Suryanti, Awang, Sharfah Ratibah, Tuan Mat, Nor Syahidatul Nadiah, Ismail, Ahmad Firdaus, Zainal Abidin

    Published 2021
    “…The results indicated that with a TPR value of 91.6%, the Random Forest algorithm achieved the highest level of accuracy in malware detection.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Discovering optimal features using static analysis and a genetic search based method for Android malware detection by Firdaus, Ahmad, Anuar, Nor Badrul, Karim, Ahmad, Razak, Mohd Faizal Ab

    Published 2018
    “…Therefore, we used genetic search (GS), which is a search based on a genetic algorithm (GA), to select the features among 106 strings. …”
    Get full text
    Get full text
    Article
  15. 15

    Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad by Mehdi , Jahanirad

    Published 2016
    “…The proposed feature sets along with selected feature extraction methods from the literature are analyzed and compared by using supervised learning techniques (i.e. support vector machines, nearest-neighbor, naïve Bayesian, neural network, logistic regression, and ensemble trees classifier), as well as unsupervised learning techniques (i.e. probabilistic-based and nearest-neighbor-based algorithms). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Bacterial image analysis using multi-task deep learning approaches for clinical microscopy by Chin, Shuang Yee, Jian, Dong, Khairunnisa, Hasikin, Romano, Ngui, Lai, Khin Wee, Pauline Yeoh, Shan Qing, Xiang, Wu

    Published 2024
    “…Methods Three object detection networks of DL algorithms, namely SSD-MobileNetV2, EfficientDet, and YOLOv4, were developed to automatically detect Escherichia coli (E. coli) bacteria from microscopic images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Since it is a costly approach, we propose a detection system using Resource Allocating Network (RAN) with data selection to select essential data. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Discovering optimal features using static analysis and a genetic search based method for Android malware detection by Ahmad Firdaus, Zainal Abidin, Nor Badrul, Anuar, Ahmad, Karim, Mohd Faizal, Ab Razak

    Published 2018
    “…Therefore, we used genetic search (GS), which is a search based on a genetic algorithm (GA), to select the features among 106 strings. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article