Search Results - (( mobile detection method algorithm ) OR ( new detection based algorithm ))

Refine Results
  1. 1
  2. 2

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…Power consumption is one major constraint that makes traditional detection methods impractical for mobile devices, while cloud-based techniques raise many privacy concerns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…A method of Path Recognition Algorithms (PRA) providing robots the autonomous ability to judge purpose of action likes human base on the input sensors from the environment. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…For static obstacle avoidance, the boundaries of the obstacle(s) are considered borders of the environment. However, the algorithm detects obstacles as a new border in dynamic obstacles once it occurs in front of the GLS waves. …”
    Get full text
    Thesis
  11. 11
  12. 12

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Empirical study on intelligent android malware detection based on supervised machine learning by Abdullah, Talal A.A., Ali, Waleed, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2020
    “…However, the most recent Android malware apps, such as zero-day, cannot be detected through conventional methods that are still based on fixed signatures or identifiers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Behavioural Feature Extraction For Context-Aware Traffic Classification Of Mobile Applications by Aun, Yichiet

    Published 2018
    “…This thesis designed a context-aware traffic classification framework that includes a set of sequential algorithms from cleaning datasets, to identifying new features and detecting optimal classifier(s) based on problem contexts to improve classification accuracy in multi-variate traffic classification.…”
    Get full text
    Get full text
    Thesis
  16. 16

    A novel bio-inspired routing algorithm based on ACO for WSNs by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2019
    “…The proposed algorithm has been simulated and verified using MATLAB and the simulation results demonstrate that new ACO based algorithm achieved improved performance, about 30% improvement compared with the traditional ACO algorithm, and faster convergence to determine the best cost route, and recorded an improvement in the energy consumption of the nodes per transmission.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Translating conventional wisdom on chicken comb color into automated monitoring of disease-infected chicken using chromaticity-based machine learning models by Bakar M.A.A.A., Ker P.J., Tang S.G.H., Baharuddin M.Z., Lee H.J., Omar A.R.

    Published 2024
    “…This paper reports on the development of an innovative technique to detect bacteria- or virus-infected chickens based on the optical chromaticity of the chicken comb. …”
    Article
  18. 18

    Impact of multiplay transmission in mobile WIMAX using overlay scanning: article / Akmarya Syukhairilnisah Mohd Akhir by Mohd Akhir, Akmarya Syukhairilnisah

    Published 2014
    “…There are several issues to impact the base station handover is a serious problem in the mobile communication system. …”
    Get full text
    Get full text
    Article
  19. 19

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…To overcome the stated problems, RD code families are used throughout this stage. Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
    Get full text
    Thesis
  20. 20

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
    Get full text
    Get full text
    Thesis