Search Results - (( mobile detection method algorithm ) OR ( based information ((svm algorithm) OR (_ algorithm)) ))
Search alternatives:
- based information »
- mobile detection »
- method algorithm »
- svm algorithm »
-
1
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…However, the most recent Android malware apps, such as zero-day, cannot be detected through conventional methods that are still based on fixed signatures or identifiers. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
3
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
Get full text
Get full text
Undergraduates Project Papers -
5
-
6
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
7
-
8
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
9
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…After extensive experiments, the validity of the proposed method was superior to the existing vision-based pose estimation algorithms. …”
Get full text
Get full text
Get full text
Article -
10
-
11
A hybrid intrusion detection system based on different machine learning algorithms
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Support Vector Machines (SVM) in Test Extraction
Published 2006“…This project's objective is to create a summarizer, or extractor, based on machine learning algorithms, which are namely SVM and K-Means. …”
Get full text
Get full text
Final Year Project -
13
Support Vector Machines (SVM) in Test Extraction
Published 2006“…This project's objective is to create a summarizer, or extractor, based on machine learning algorithms, which are namely SVM and K-Means. …”
Get full text
Get full text
Final Year Project -
14
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…The performance results obtained using two publicly available datasets showed significant improvement over baseline methods in the detection of specific activity details and reduced error rate. …”
Get full text
Get full text
Article -
15
-
16
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
An optimal mesh algorithm for remote protein homology detection
Published 2011“…Next, a refinement algorithm was applied on the protein sequences to reduce misalignments. …”
Get full text
Get full text
Article -
18
Lung cancer medical images classification using hybrid CNN-SVM
Published 2021“…This paper presents an image classification method based on the hybrid Convolutional Neural Network (CNN) algorithm and Support Vector Machine (SVM). …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Fast temporal video segmentation based on Krawtchouk-Tchebichef moments
Published 2020“…The proposed algorithm is based on orthogonal moments which are considered as features to detect transitions. …”
Get full text
Get full text
Get full text
Article -
20
Genetic case-based reasoning for improved mobile phone faults diagnosis
Published 2018“…Test results show that GCBR can detect several mobile phone faults with average accuracy 98.7%.…”
Get full text
Get full text
Article
