Search Results - (( mobile detection method algorithm ) OR ( based information from algorithm ))
Search alternatives:
- based information »
- mobile detection »
- method algorithm »
- information from »
- from algorithm »
-
1
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
2
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
3
Hybrid intelligent approach for network intrusion detection
Published 2015“…A lot of sensitive information passes through various kinds of computer devices, ranging from minicomputers to servers and mobile devices. …”
Get full text
Get full text
Get full text
Thesis -
4
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…The performance results obtained using two publicly available datasets showed significant improvement over baseline methods in the detection of specific activity details and reduced error rate. …”
Get full text
Get full text
Article -
5
-
6
A novel bio-inspired routing algorithm based on ACO for WSNs
Published 2019“…Utilizing the novel technique and considering both the node mobility and the existing energy of the nodes, an optimal route and best cost from the originating node to the target node can be detected. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Efficient NASNetMobile-enhanced Vision Transformer for weakly supervised video anomaly detection
Published 2026“…Current video anomaly detection (VAD) methods struggle to prioritize informative frames and lack effective mechanisms to collect both local and global video contexts. …”
Get full text
Get full text
Article -
8
Applying Bayesian probability for Android malware detection using permission features
Published 2021“…The experiments conducted using chi-square as an algorithm and Naïve Bayes as a classifier. The accuracy of the detection is 85%. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Design and development of IP based automotic bottle inspection system using controllino maxi automation / Abdul Aziz Ahmed Siyad
Published 2019“…In order to improve the quality of the line this study proposes Automatic vision inspection machine that contains vision inspection part and conveyor line implemented using Controllino PLC and Omron photo-electric sensors and Mobile camera. Stream of real-time videos is acquired from the camera to Matlab using wireless network, there were methods and algorithms used in the vision inspection to analyse and detect the presence and properties of a bottle then extract meaningful information using Graphical User Interface, Noise or unwanted objects were mostly removed using filtering, segmentation and blob analyses. …”
Get full text
Get full text
Get full text
Thesis -
10
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The temporal micro cluster data structure is proposed in CC_TRS algorithm to store the summarized information for each group of similar segments. …”
Get full text
Get full text
Thesis -
11
Testing the minimal bounded space method on vision-based drone navigation / Yap Seng Kuang
Published 2021“…The spatial openings are derived by analyzing occlusion information from the environment, which is available from the depth information. …”
Get full text
Get full text
Get full text
Thesis -
12
Bacterial image analysis using multi-task deep learning approaches for clinical microscopy
Published 2024“…Methods Three object detection networks of DL algorithms, namely SSD-MobileNetV2, EfficientDet, and YOLOv4, were developed to automatically detect Escherichia coli (E. coli) bacteria from microscopic images. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Nowadays, fingerprinting based Wi-Fi positioning systems successfully provide location information to mobile users. …”
Get full text
Get full text
Conference or Workshop Item -
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis -
15
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…First, a content negotiation and adaptation architecture was proposed to facilitate the process of identifying and detecting client device. It differs from other existing content negotiation approaches by introducing the idea of combining dynamic and static device capabilities detection methods. …”
Get full text
Get full text
Thesis -
16
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Recent industrial solutions to overcome the problem includes using manual registration, using 125kHz proximity card, using mobile application to scan QR code and others. These industrial solutions can obtain visitors’ personal information without detecting their real-time location at a large area such as in UMS. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…As for the first component, a link layer mechanism with the notion of a selection algorithm based on weighted mean is primarily introduced for collecting link layer information and discovering the candidate access router. …”
Get full text
Get full text
Thesis -
18
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
Get full text
Get full text
Get full text
Article -
19
Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm
Published 2010“…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…This research presents a mobile malware static detection method based on Naive Bayes. …”
Get full text
Get full text
Thesis
