Search Results - (( mobile detection method algorithm ) OR ( image classification ant algorithm ))*

Refine Results
  1. 1

    Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification by Petwan, Montha

    Published 2023
    “…Therefore, an improved feature extraction and selection for sky image classification (FESSIC) algorithm is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The result presents that the Ant-Search algorithm via LibSVM was determined as the best combination with 100% accuracy. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Plant leaf recognition algorithm using ant colony-based feature extraction technique by Ghasab, Mohammad Ali Jan

    Published 2013
    “…Then, based on the characteristics of each species, decision making is done by means of ant colony optimisation as a search algorithm to return the optimal subset of features regarding the related species. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Feature decision-making ant colony optimization system for an automated recognition of plant species by Ghasab, Mohammad Ali Jan, Khamis, Shamsul, Faruq, Mohammad, Fariman, Hessam Jahani

    Published 2015
    “…In the present paper, an expert system for automatic recognition of different plant species through their leaf images is investigated by employing the ant colony optimization (ACO) as a feature decision-making algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Automated recognition of Ficus deltoidea using ant colony optimization technique by Ishak, Asnor Juraiza, Che Soh, Azura, Marhaban, Mohammad Hamiruce, Khamis, Shamsul, Ghasab, Mohammad Ali Jan

    Published 2013
    “…This paper presents innovative method to improve the accuracy of classification as well the efficiency, such that irrelevant features that make computational complexity are ignored by feature subset selection that is proposed by means of ant colony optimization algorithm (ACO). …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Usually, most of the standard face recognition systems contain four sections: face detection, feature extraction, feature selection, and classification. Although there are many barriers for each part of this system, many algorithms are also created to tackle these limitations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…This research presents a mobile malware static detection method based on Naive Bayes. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Automated feature selection using boruta algorithm to detect mobile malware by Che Akmal, Che Yahaya, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Ernawan, Ferda, Mohd Faizal, Ab Razak

    Published 2020
    “…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…More comprehensive study in behaviour coordination will be the major focus to ensure smoother robot navigation and more effective fire detection capability. Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method by Amusa, Morufu, Bamidele, Oluwade

    Published 2020
    “…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
    Get full text
    Get full text
    Journal