Search Results - (( mobile detection method algorithm ) OR ( based applications a algorithm ))*

Refine Results
  1. 1

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…The shortest/optimal path generation is essential for the efficient operation of a mobile robot. Recent advances in robotics and machine intelligence have led to the application of modern optimization method such as the genetic algorithm (GA), to solve the path-planning problem. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…This research presents a mobile malware static detection method based on Naive Bayes. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…This method makes a tradeoff between token-based and permission-based. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…A method of Path Recognition Algorithms (PRA) providing robots the autonomous ability to judge purpose of action likes human base on the input sensors from the environment. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.] by Ahmad, Illiasaak, Anak Buja, Alya@Geogiana, Abdullah Sani, Anis Shobirin

    Published 2013
    “…Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Computing non-contactable drowsiness monitoring system with mobile machine vision by Alixson Polumpung, Lorita Angeline, Helen Sin Ee Chuo, Tan, Min Keng, Lim, Kit Guan, Teo, Kenneth Tze Kin

    Published 2022
    “…This project proposes a human facial features detection based on color segmentation via skin color and Viola- Jones algorithm for real time application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…In addition, the study suggests a promising potential of hybrid feature selection approach, diversity-based multiple classifier systems to improve mobile and wearable sensor-based human activity detection and health monitoring system. © 2019, The Author(s).…”
    Get full text
    Get full text
    Article
  15. 15

    A real-time mobile notification system for inventory stock out detection using SIFT and RANSAC by Merrad, Yacine, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Gunawan, Teddy Surya

    Published 2020
    “…The proposed method is a machine learning based real-time notification system using the exciting Scale Invariant Feature Transform feature detector (SIFT) and Random Sample Consensus (RANSAC) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Genetic case-based reasoning for improved mobile phone faults diagnosis by Mohammed, Mazin Abed, Abd Ghani, Mohd Khanapi, Arunkumar, N., Obaid, Omar Ibrahim, A. Mostafa, Salama, Musa Jaber, Mustafa, Burhanuddin, M.A., Mohammed Matar, Bilal, Abdullatif, Saif Khalid, Ahmed Ibrahim, Dheyaa

    Published 2018
    “…GCBR is implemented in a mobile phone fault diagnosis application. This domain is a good testing environment because mobile phones are of various types and models. …”
    Get full text
    Get full text
    Article
  17. 17

    Android malware detection using permission based static analysis by Mohd Ariffin, Noor Afiza, Casinto, Hanna Pungo

    Published 2024
    “…Android is a mobile operating system that is the most used on smart mobile phones. …”
    Get full text
    Get full text
    Article
  18. 18

    Android malware detection using permission based static analysis by Mohd Ariffin, Noor Afiza, Casinto, Hanna Pungo

    Published 2023
    “…Android is a mobile operating system that is the most used on smart mobile phones. …”
    Get full text
    Get full text
    Article
  19. 19

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…In order to improve the detection rate of malicious application on the Android platform, a novel knowledge-based database discovery model that improves apriori association rule mining of a priori algorithm with Particle Swarm Optimization (PSO) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Conference or Workshop Item