Search Results - (( mobile detection method algorithm ) OR ( based information svm algorithm ))
Search alternatives:
- based information »
- mobile detection »
- method algorithm »
- information svm »
- svm algorithm »
-
1
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…However, the most recent Android malware apps, such as zero-day, cannot be detected through conventional methods that are still based on fixed signatures or identifiers. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
Get full text
Get full text
Get full text
Article -
5
Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm
Published 2010“…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…This research presents a mobile malware static detection method based on Naive Bayes. …”
Get full text
Get full text
Thesis -
7
A hybrid intrusion detection system based on different machine learning algorithms
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Support Vector Machines (SVM) in Test Extraction
Published 2006“…This project's objective is to create a summarizer, or extractor, based on machine learning algorithms, which are namely SVM and K-Means. …”
Get full text
Get full text
Final Year Project -
9
Support Vector Machines (SVM) in Test Extraction
Published 2006“…This project's objective is to create a summarizer, or extractor, based on machine learning algorithms, which are namely SVM and K-Means. …”
Get full text
Get full text
Final Year Project -
10
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
11
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
Get full text
Get full text
Get full text
Article -
12
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Lung cancer medical images classification using hybrid CNN-SVM
Published 2021“…This paper presents an image classification method based on the hybrid Convolutional Neural Network (CNN) algorithm and Support Vector Machine (SVM). …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
16
Diagnosis and treatment recommender system for myocardial infarction using decision tree and Support Vector Machines (SVM) / Wan Marzuqiamrin Wan Mansor
Published 2025“…This project presents the development process of the prototype for diagnosis and treatment recommender system for myocardial infarction using decision tree and support vector machine (SVM) algorithms. Healthcare professionals can benefit from this prototype system that uses ECG images for myocardial infarction diagnosis while recommending proper treatments based on patient clinical information. …”
Get full text
Get full text
Thesis -
17
An optimal mesh algorithm for remote protein homology detection
Published 2011“…Therefore, this paper deals with remote protein homology detection via assessing the impact of using structural information on protein multiple alignments over sequence information. …”
Get full text
Get full text
Article -
18
-
19
Analysing machine learning models to detect disaster events using social media
Published 2023“…Therefore, this study presents a comparison between three algorithms, K-Nearest Neighbour (KNN), Naive Bayes (NB), and Support Vector Machine (SVM), to classify and sort messages so that the process of examining them can be simplified and accelerated. …”
text::Thesis -
20
Optimizing the performance of mobile malware detection using the indexing rule
Published 2024journal::journal article
