Search Results - (( mobile detection method algorithm ) OR ( based presentation based algorithm ))*

Refine Results
  1. 1

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…This algorithm is presented and evaluated for different scenarios of mobility of nodes, failure, load and number of nodes. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…This research presents a mobile malware static detection method based on Naive Bayes. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…This thesis presents a research whose objective is to design an intrusion detection model for Mobile Ad hoc NETworks (MANET). …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…A method of Path Recognition Algorithms (PRA) providing robots the autonomous ability to judge purpose of action likes human base on the input sensors from the environment. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…Power consumption is one major constraint that makes traditional detection methods impractical for mobile devices, while cloud-based techniques raise many privacy concerns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors by Ang, Yang Yi

    Published 2020
    “…The Amplitude Pace Switching (APS) detection algorithm is introduced to detect the amplitude of the user’s body movement for pace switching. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Mobile robot positioning system by Khairulnizam Othman

    Published 2008
    “…Several motion control algorithm using BS2 software was develop to test the capabilities of system mobile motion in Y axis, X axis and other, particular attention is paid to evaluate the ability of the using Odometry to detect and correct positioning of the mobile platforms from 4 point. …”
    Get full text
    Learning Object
  12. 12

    Empirical study on intelligent android malware detection based on supervised machine learning by Abdullah, Talal A.A., Ali, Waleed, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2020
    “…However, the most recent Android malware apps, such as zero-day, cannot be detected through conventional methods that are still based on fixed signatures or identifiers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Implementation of RBG-HS-CbCr skin colour model using mobile python PyS60 by Ngui,, Lin Hui.

    Published 2009
    “…Over the past few years, r esearchers have come up with various algorithms and method in detecti ng human skin colour. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15

    Wifi positioning system / Amalina Abdul Halim by Abdul Halim, Amalina

    Published 2006
    “…The aim of this project is to develop an outdoor positioning system that can estimate the location of mobile devices based on signal strength that broadcast by access point. …”
    Get full text
    Student Project
  16. 16

    Covariance Inflation Method In Ros Based Mobile Robot Navigation by Ezzah Naziha, Roslim

    Published 2022
    “…Then, this thesis also considers the ROS software for the detection and avoidance of obstacles. In mobile robots, navigation is a difficult problem. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Comprehensive review of drones collision avoidance schemes: challenges and open issues by Rezaee, Mohammad Reza, Abdul Hamid, Nor Asilah Wati, Hussin, Masnida, Ahmad Zukarnain, Zuriati

    Published 2024
    “…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Gas inspector mobile robot as carbon monoxide source finder by Rezaeian, Sarah

    Published 2015
    “…Algorithms used for exploration and localization by mobile robots are mostly been developed to run on a PC, so they are not executed in real-time. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Efficient NASNetMobile-enhanced Vision Transformer for weakly supervised video anomaly detection by Arif Mohamad, Muhammad Luqman, Abd Rahman, Mohd Amiruddin, Mohd Shah, Nurisya, Kumar Sangaiah, Arun

    Published 2026
    “…Second, we employed a pretrained, low-parameter NASNetMobile algorithm that efficiently extracts fine-grained local spatial details. …”
    Get full text
    Get full text
    Article
  20. 20

    Experiment and analysis of computer vision-based wrist radial and ulnar deviation exercises by M. Zabri, Abu Bakar, Rosdiyana, Samad, Pebrianti, Dwi, Mahfuzah, Mustafa, Nor Rul Hasma, Abdullah

    Published 2017
    “…This paper presents the experiment and analysis of wrist radial and ulnar deviation exercises system based on computer vision method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item