Search Results - (( mobile detection method algorithm ) OR ( rate detection system algorithm ))

Refine Results
  1. 1

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…A series of experimental results demonstrate that the proposed intrusion detection model can effectively detect anomalies with low false positive rate, high detection rate and achieve high detection accuracy.…”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…To this end, computationally efficient classification algorithms such as decision tree, logistic regression and k-Nearest Neighbors were used to implement diverse, flexible and dynamic human activity detection systems. …”
    Get full text
    Get full text
    Article
  5. 5

    Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA) by Nur Khairani, Kamarudin, Ahmad Firdaus, Zainal Abidin, Azlee, Zabidi, Ferda, Ernawan, Syifak, Izhar Hisham, Mohd Faizal, Ab Razak

    Published 2023
    “…However, in machine learning intelligence detection, too many insignificant features will decrease the percentage of the detection’s accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Electroencephalogram signal interpretation system for mobile robot by Hasan, Intan Helina

    Published 2013
    “…Using sample datasets, the EEG signal is analyzed to determine the most suitable scalp area for P300 detection, while optimization with genetic algorithm (GA) is developed to select best four channels. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Adaptive template matching of photoplethysmogram pulses to detect motion artefact by Lim, Pooi Khoon, Ng, Siew Cheok, Lovell, Nigel Hamilton, Yu, Yong Poh, Tan, Maw Pin, McCombie, Devin, Lim, Einly, Redmond, Stephen James

    Published 2018
    “…The performance of our algorithm was evaluated using data obtained from two different sources: (i) our own data collected from 19 healthy subjects using the wearable Sotera Visi Mobile system (Sotera Wireless Inc.) as they performed various movement types; and (ii) ICU data provided by the PhysioNet MIMIC II database. …”
    Get full text
    Get full text
    Article
  10. 10

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…The hyperparameter optimization achieved best performance by implementing the EHS algorithm at the system level, thereby increasing feature-detection accuracy and bridging the gap between deep learning innovation and real-world malware detection and response models. …”
    thesis::doctoral thesis
  11. 11

    Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Al-Garadi, Mohammed Ali

    Published 2019
    “…Furthermore, the review presents different multiple classifier system design and fusion methods that were recently proposed in literature. …”
    Get full text
    Get full text
    Article
  12. 12

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…The performances of the system compared to reported systems were characterized by referring to the signal to noise ratio (S R), the bit error rate (BER) and the effective power (Psr). …”
    Get full text
    Thesis
  13. 13

    Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection by Jia, Liu

    Published 2024
    “…The proposed method outperforms CSO-ANFIS by exhibiting a 4.06% higher detection rate (improving from 95.80%) and a 2.31% lower false alarm rate (compared to 3.45%). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…The results indi�cate that detection system can detect the DDoS backscatter from both labeled and unlabeled packets with high recall and precision rate within a short time. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil

    Published 2013
    “…Time Division–Synchronous Code Division Multiple Access (TD-SCDMA) has been classified as one of 3G wireless communication systems in the last years. The physical layers of this system have adopted several advanced technologies, such as:joint detections, uplink synchronization, and smart antennas, making it capable of meeting the requirements of 4G systems directly. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…However, the execution of MDSM applications in MECC systems becomes hard due to multiple factors. The critical factors of complexity at application level include data size and data rate of continuously streaming data, the selection of data fusion and data preprocessing methods, the choice of learning models, learning rates and learning modes, and the adoption of data mining algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks by Solouk, Vahid

    Published 2009
    “…This mechanism is then used as handoff decision phase with an improved mobile-assisted handoff method as an extension of Fast Mobile IPv6 Handoff (FMIPv6) in vertical mode. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fruity vegetable recognition system using Color Histogram and BRISK features extraction / Siti Hajar Mohd Nasri by Mohd Nasri, Siti Hajar

    Published 2016
    “…In process to extract the two main features, K-means clustering algorithm is used as background subtraction method with combination of Canny’s Edge Detection and Mathematical Morphology Operation for shape extraction. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). The results shows that the algorithm ONF-TRS has low computational cost and high compression rate as compared with the existing works. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Mitigation of Mach Zehnder modulator nonlinearity in millimeter wave radio over fiber system using digital predistortion by Duraikannan, Shankar

    Published 2017
    “…The coefficient computation is performed using recursive prediction error method (RPEM) algorithm which shows a dominant spectral regrowth reduction and in-band distortion reduction with reduced complexity compared to the commonly used slow converging, least mean square algorithm. …”
    Get full text
    Get full text
    Thesis