Search Results - (( mobile detection method algorithm ) OR ( rate detection system algorithm ))
Search alternatives:
- mobile detection »
- method algorithm »
- system algorithm »
- rate detection »
-
1
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…A series of experimental results demonstrate that the proposed intrusion detection model can effectively detect anomalies with low false positive rate, high detection rate and achieve high detection accuracy.…”
Get full text
Get full text
Get full text
Thesis -
2
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
3
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To this end, computationally efficient classification algorithms such as decision tree, logistic regression and k-Nearest Neighbors were used to implement diverse, flexible and dynamic human activity detection systems. …”
Get full text
Get full text
Article -
5
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…However, in machine learning intelligence detection, too many insignificant features will decrease the percentage of the detection’s accuracy. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Electroencephalogram signal interpretation system for mobile robot
Published 2013“…Using sample datasets, the EEG signal is analyzed to determine the most suitable scalp area for P300 detection, while optimization with genetic algorithm (GA) is developed to select best four channels. …”
Get full text
Get full text
Thesis -
8
A generalized laser simulator algorithm for mobile robot path planning with obstacle avoidance
Published 2022“…According to the results, the GLS algorithm outperformed the original laser simulator (LS) method in path and success rate. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Adaptive template matching of photoplethysmogram pulses to detect motion artefact
Published 2018“…The performance of our algorithm was evaluated using data obtained from two different sources: (i) our own data collected from 19 healthy subjects using the wearable Sotera Visi Mobile system (Sotera Wireless Inc.) as they performed various movement types; and (ii) ICU data provided by the PhysioNet MIMIC II database. …”
Get full text
Get full text
Article -
10
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…The hyperparameter optimization achieved best performance by implementing the EHS algorithm at the system level, thereby increasing feature-detection accuracy and bridging the gap between deep learning innovation and real-world malware detection and response models. …”
thesis::doctoral thesis -
11
Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions
Published 2019“…Furthermore, the review presents different multiple classifier system design and fusion methods that were recently proposed in literature. …”
Get full text
Get full text
Article -
12
Development of new code for optical code division multiple access systems
Published 2011“…The performances of the system compared to reported systems were characterized by referring to the signal to noise ratio (S R), the bit error rate (BER) and the effective power (Psr). …”
Get full text
Thesis -
13
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
Published 2024“…The proposed method outperforms CSO-ANFIS by exhibiting a 4.06% higher detection rate (improving from 95.80%) and a 2.31% lower false alarm rate (compared to 3.45%). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…The results indi�cate that detection system can detect the DDoS backscatter from both labeled and unlabeled packets with high recall and precision rate within a short time. …”
Get full text
Get full text
Thesis -
15
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…Time Division–Synchronous Code Division Multiple Access (TD-SCDMA) has been classified as one of 3G wireless communication systems in the last years. The physical layers of this system have adopted several advanced technologies, such as:joint detections, uplink synchronization, and smart antennas, making it capable of meeting the requirements of 4G systems directly. …”
Get full text
Get full text
Thesis -
16
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…However, the execution of MDSM applications in MECC systems becomes hard due to multiple factors. The critical factors of complexity at application level include data size and data rate of continuously streaming data, the selection of data fusion and data preprocessing methods, the choice of learning models, learning rates and learning modes, and the adoption of data mining algorithms. …”
Get full text
Get full text
Get full text
Thesis -
17
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…This mechanism is then used as handoff decision phase with an improved mobile-assisted handoff method as an extension of Fast Mobile IPv6 Handoff (FMIPv6) in vertical mode. …”
Get full text
Get full text
Thesis -
18
Fruity vegetable recognition system using Color Histogram and BRISK features extraction / Siti Hajar Mohd Nasri
Published 2016“…In process to extract the two main features, K-means clustering algorithm is used as background subtraction method with combination of Canny’s Edge Detection and Mathematical Morphology Operation for shape extraction. …”
Get full text
Get full text
Thesis -
19
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). The results shows that the algorithm ONF-TRS has low computational cost and high compression rate as compared with the existing works. …”
Get full text
Get full text
Thesis -
20
Mitigation of Mach Zehnder modulator nonlinearity in millimeter wave radio over fiber system using digital predistortion
Published 2017“…The coefficient computation is performed using recursive prediction error method (RPEM) algorithm which shows a dominant spectral regrowth reduction and in-band distortion reduction with reduced complexity compared to the commonly used slow converging, least mean square algorithm. …”
Get full text
Get full text
Thesis
