Search Results - (( mobile detection method algorithm ) OR ( its application based algorithm ))*

Refine Results
  1. 1

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…A method of Path Recognition Algorithms (PRA) providing robots the autonomous ability to judge purpose of action likes human base on the input sensors from the environment. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…This research investigates the use of a promising technique from machine learning to designing the most suitable intrusion detection for this challenging network type. The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Computing non-contactable drowsiness monitoring system with mobile machine vision by Alixson Polumpung, Lorita Angeline, Helen Sin Ee Chuo, Tan, Min Keng, Lim, Kit Guan, Teo, Kenneth Tze Kin

    Published 2022
    “…This project proposes a human facial features detection based on color segmentation via skin color and Viola- Jones algorithm for real time application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Deep learning-based single-shot and real-time vehicle detection and ego-lane estimation by Abdul Matin, M. A. A., Ahmad Fakhri, A. S., Mohd Zaki, Hasan Firdaus, Zainal Abidin, Zulkifli, Mohd Mustafah, Y., Abd Rahman, H., Mahamud, N. H., Hanizam, S., Ahmad Rudin, N. S.

    Published 2020
    “…Moreover, we achieve a 63.7% mAP for vehicle detection on our dataset. The proposed architecture shows that an elaborate pipeline of multiple steps to develop an algorithm for the FCWS application is eliminated. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Smart mobile robot system for rubbish collection by Tan, Sien Siang, Ali, Mohammed A. H.

    Published 2018
    “…This paper explained about the types of image processing, detection and recognition methods and image filters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Covariance Inflation Method In Ros Based Mobile Robot Navigation by Ezzah Naziha, Roslim

    Published 2022
    “…Then, this thesis also considers the ROS software for the detection and avoidance of obstacles. In mobile robots, navigation is a difficult problem. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Wifi positioning system / Amalina Abdul Halim by Abdul Halim, Amalina

    Published 2006
    “…This paper present the experimental results that demonstrate the ability of Wifi Positioning system to estimate location of the devices using K-NN algorithm and result in application part is shown based on highest percentage accuracy of time taken to intend bus stop.…”
    Get full text
    Student Project
  10. 10

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…The hyperparameter optimization achieved best performance by implementing the EHS algorithm at the system level, thereby increasing feature-detection accuracy and bridging the gap between deep learning innovation and real-world malware detection and response models. …”
    thesis::doctoral thesis
  11. 11

    Design and development of IP based automotic bottle inspection system using controllino maxi automation / Abdul Aziz Ahmed Siyad by Abdul Aziz , Ahmed Siyad

    Published 2019
    “…In order to improve the quality of the line this study proposes Automatic vision inspection machine that contains vision inspection part and conveyor line implemented using Controllino PLC and Omron photo-electric sensors and Mobile camera. Stream of real-time videos is acquired from the camera to Matlab using wireless network, there were methods and algorithms used in the vision inspection to analyse and detect the presence and properties of a bottle then extract meaningful information using Graphical User Interface, Noise or unwanted objects were mostly removed using filtering, segmentation and blob analyses. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Gas inspector mobile robot as carbon monoxide source finder by Rezaeian, Sarah

    Published 2015
    “…Algorithms used for exploration and localization by mobile robots are mostly been developed to run on a PC, so they are not executed in real-time. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Maize leaf disease detection and classification using Convolutional Neural Network (CNN) / Syafiqah Amir by Amir, Syafiqah

    Published 2023
    “…The labelled dataset is then used to create and train a CNN architecture which define the type of the leaf based on its category. The dataset used in this project consist of 800 images of four category of leaf achieved 90 percent of accuracy by using the CNN algorithm.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad by Mehdi , Jahanirad

    Published 2016
    “…The context model allows computing the mobile device intrinsic fingerprints for the source mobile device identification. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…This research presents a mobile malware static detection method based on Naive Bayes. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…This research presents a design and development of robotic system based on LEGO Mindstorm kit. The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Automated feature selection using boruta algorithm to detect mobile malware by Che Akmal, Che Yahaya, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Ernawan, Ferda, Mohd Faizal, Ab Razak

    Published 2020
    “…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
    Get full text
    Get full text
    Get full text
    Article