Search Results - (( mobile detection method algorithm ) OR ( based information from algorithm ))

Refine Results
  1. 1

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.] by Ahmad, Illiasaak, Anak Buja, Alya@Geogiana, Abdullah Sani, Anis Shobirin

    Published 2013
    “…Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
    Get full text
    Get full text
    Research Reports
  3. 3

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…A lot of sensitive information passes through various kinds of computer devices, ranging from minicomputers to servers and mobile devices. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…The performance results obtained using two publicly available datasets showed significant improvement over baseline methods in the detection of specific activity details and reduced error rate. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    A novel bio-inspired routing algorithm based on ACO for WSNs by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2019
    “…Utilizing the novel technique and considering both the node mobility and the existing energy of the nodes, an optimal route and best cost from the originating node to the target node can be detected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient NASNetMobile-enhanced Vision Transformer for weakly supervised video anomaly detection by Arif Mohamad, Muhammad Luqman, Abd Rahman, Mohd Amiruddin, Mohd Shah, Nurisya, Kumar Sangaiah, Arun

    Published 2026
    “…Current video anomaly detection (VAD) methods struggle to prioritize informative frames and lack effective mechanisms to collect both local and global video contexts. …”
    Get full text
    Get full text
    Article
  8. 8

    Applying Bayesian probability for Android malware detection using permission features by Sharfah Ratibah, Tuan Mat, Mohd Faizal, Ab Razak, Mohd Nizam, Mohmad Kahar, Juliza, Mohamad Arif, Azlee, Zabidi

    Published 2021
    “…The experiments conducted using chi-square as an algorithm and Naïve Bayes as a classifier. The accuracy of the detection is 85%. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Design and development of IP based automotic bottle inspection system using controllino maxi automation / Abdul Aziz Ahmed Siyad by Abdul Aziz , Ahmed Siyad

    Published 2019
    “…In order to improve the quality of the line this study proposes Automatic vision inspection machine that contains vision inspection part and conveyor line implemented using Controllino PLC and Omron photo-electric sensors and Mobile camera. Stream of real-time videos is acquired from the camera to Matlab using wireless network, there were methods and algorithms used in the vision inspection to analyse and detect the presence and properties of a bottle then extract meaningful information using Graphical User Interface, Noise or unwanted objects were mostly removed using filtering, segmentation and blob analyses. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…The temporal micro cluster data structure is proposed in CC_TRS algorithm to store the summarized information for each group of similar segments. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Testing the minimal bounded space method on vision-based drone navigation / Yap Seng Kuang by Yap , Seng Kuang

    Published 2021
    “…The spatial openings are derived by analyzing occlusion information from the environment, which is available from the depth information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Bacterial image analysis using multi-task deep learning approaches for clinical microscopy by Chin, Shuang Yee, Jian, Dong, Khairunnisa, Hasikin, Romano, Ngui, Lai, Khin Wee, Pauline Yeoh, Shan Qing, Xiang, Wu

    Published 2024
    “…Methods Three object detection networks of DL algorithms, namely SSD-MobileNetV2, EfficientDet, and YOLOv4, were developed to automatically detect Escherichia coli (E. coli) bacteria from microscopic images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Nowadays, fingerprinting based Wi-Fi positioning systems successfully provide location information to mobile users. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…First, a content negotiation and adaptation architecture was proposed to facilitate the process of identifying and detecting client device. It differs from other existing content negotiation approaches by introducing the idea of combining dynamic and static device capabilities detection methods. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Recent industrial solutions to overcome the problem includes using manual registration, using 125kHz proximity card, using mobile application to scan QR code and others. These industrial solutions can obtain visitors’ personal information without detecting their real-time location at a large area such as in UMS. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  17. 17

    Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks by Solouk, Vahid

    Published 2009
    “…As for the first component, a link layer mechanism with the notion of a selection algorithm based on weighted mean is primarily introduced for collecting link layer information and discovering the candidate access router. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…This research presents a mobile malware static detection method based on Naive Bayes. …”
    Get full text
    Get full text
    Thesis