Search Results - (( mobile detection method algorithm ) OR ( based applications a algorithm ))*
Search alternatives:
- based applications »
- mobile detection »
- method algorithm »
- applications a »
- a algorithm »
-
1
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…The shortest/optimal path generation is essential for the efficient operation of a mobile robot. Recent advances in robotics and machine intelligence have led to the application of modern optimization method such as the genetic algorithm (GA), to solve the path-planning problem. …”
Get full text
Get full text
Get full text
Article -
2
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…This research presents a mobile malware static detection method based on Naive Bayes. …”
Get full text
Get full text
Thesis -
4
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…This method makes a tradeoff between token-based and permission-based. …”
Get full text
Get full text
Thesis -
6
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
Get full text
Get full text
Get full text
Thesis -
7
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…A method of Path Recognition Algorithms (PRA) providing robots the autonomous ability to judge purpose of action likes human base on the input sensors from the environment. …”
Get full text
Get full text
Thesis -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
10
Computing non-contactable drowsiness monitoring system with mobile machine vision
Published 2022“…This project proposes a human facial features detection based on color segmentation via skin color and Viola- Jones algorithm for real time application. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Deep learning-based single-shot and real-time vehicle detection and ego-lane estimation
Published 2020“…In this paper, a DNN based single-shot vehicle detection and ego-lane estimation architecture is presented. …”
Get full text
Get full text
Get full text
Article -
12
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
Get full text
Get full text
Get full text
Thesis -
13
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
Get full text
Get full text
Get full text
Thesis -
14
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…In addition, the study suggests a promising potential of hybrid feature selection approach, diversity-based multiple classifier systems to improve mobile and wearable sensor-based human activity detection and health monitoring system. © 2019, The Author(s).…”
Get full text
Get full text
Article -
15
A real-time mobile notification system for inventory stock out detection using SIFT and RANSAC
Published 2020“…The proposed method is a machine learning based real-time notification system using the exciting Scale Invariant Feature Transform feature detector (SIFT) and Random Sample Consensus (RANSAC) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Genetic case-based reasoning for improved mobile phone faults diagnosis
Published 2018“…GCBR is implemented in a mobile phone fault diagnosis application. This domain is a good testing environment because mobile phones are of various types and models. …”
Get full text
Get full text
Article -
17
Android malware detection using permission based static analysis
Published 2024“…Android is a mobile operating system that is the most used on smart mobile phones. …”
Get full text
Get full text
Article -
18
Android malware detection using permission based static analysis
Published 2023“…Android is a mobile operating system that is the most used on smart mobile phones. …”
Get full text
Get full text
Article -
19
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In order to improve the detection rate of malicious application on the Android platform, a novel knowledge-based database discovery model that improves apriori association rule mining of a priori algorithm with Particle Swarm Optimization (PSO) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item
